Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, âtrustedâ virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
DescriptionThis application is a continuation of commonly assigned copending application Ser. No. 09/221,479, filed Dec. 28, 1998, which is a continuation of application Ser. No. 08/699,711, filed Aug. 12, 1996, now abandoned, which is a continuation-in-part of application Ser. No. 08/388,107, filed Feb. 13, 1995, now abandonedâall of which are incorporated herein by reference.
This application is a continuation-in-part of commonly assigned copending Ser. No. 08/388,107 of Ginter et al. filed 13 Feb. 1995, entitled âSystems and Methods for Secure Transaction Management and Electronic Rights Protectionâ (Attorney Reference No. 895-13) (hereafter âGinter et al.â).
This application is related to concurrently filed commonly assigned copending application Ser. No. ______ of Ginter et al. entitled âTrusted Infrastructure Support Systems, Methods and Techniques, Commerce Process Control and Automation, Distributed Computing, and Rights Managementâ (Attorney Reference No. 895-32rwf) (hereafter referred to as âShear et alâ to avoid confusion with the âGinter et alâ reference in the paragraph above). The entire disclosure (including the drawings) of this related Shear et al. patent application is incorporated by reference into this specification as if expressly set forth in this specification.
These inventions relate to secure and trusted delivery of digital information. More specifically, these inventions pertain to techniques, methods and systems for providing reliable, trusted, verifiable delivery, handling, creation and/or execution of digital items such as documents, executable code (e.g., Java applets), and/or any other information capable of being represented in digital form. The present invention also relates to commercial and other electronic activities involving a trusted third party electronic go-between (such as a computer controlled process) to audit, validate, and/or direct electronic transactions, executions and/or delivery and/or to archive information representing and/or at least in part comprising securely communicated digital information.
There is a great need for convenient, cost effective techniques to securely handle and deliver documents and other items. Existing methods such as express and personal couriers, registered mail, facsimile and electronic mail fulfill some of these needs but these techniques each have their problems and are deficient in important ways.
Trusted Personal Couriers
Perhaps the ultimate in secure document handling is the personal trusted courier. Many of us have seen spy films showing a trusted courier delivering documents containing state secrets. In such scenarios, the document sender places the document or other item into a lockable attaché case. The sender seals and locks the case with a key or combination that only he and the recipient have. The courier handcuffs the case to his or her wrist, boards an airplane and flies to the required destinationâall the while carefully guarding the attaché case and its contents. Upon arriving at the destination, the courier personally delivers the case to the intended recipient. The recipient unlocks the case and retrieves its contents, all the while having a high degree of assurance that the contents have been kept secret.
The confidentiality, security and reliability provided by a personal trusted document courier has never really been matched by any other form of document delivery. Even though we sometimes might want or need the services of a personal trusted document courier, it is likely that practical reasons (such as cost and availability) require us to use less trusted forms of delivery for even our most important and confidential documents or other items. Moreover, even the trusted courier technique does not provide a reliable means of later providing how and when the information was used by the recipient and/or subsequently handled by others to whom the recipient may pass the information and what information was actually sent. This approach also cannot provide the degree of interactivity between the sender and the recipient possible in a world of near instantaneous communications, including seamlessly supporting processes related to rights management, and document creation and dissemination.
As discussed below, existing alternatives to the trusted courier are more practical and less expensive, and some offer advantages such as instantaneous communications and interactivityâbut all suffer from various disadvantages.
Express Courier Services
Federal Express and other express courier services provide rapid (for example, overnight) delivery services at a relatively high degree of trustedness.
In the typical case, the sender places the items to be delivered into a special, tear resistant sealed envelope, and fills out an âair billâ that lists the sender's name, address and telephone number, and the intended recipient's name, address and telephone number. The âair billâ also lists options such as, for example, the type of delivery service required (i.e., delivery next business morning, next business afternoon, or second business day), whether the sender requires Federal Express to obtain the recipient's signature, the payment method, and a unique âtracking numberâ used to uniquely identify the package.
Once the package is complete and ready to send, the sender may provide it to Federal Express through a number of different methods:
Federal Express maintains a fleet of aircraft that shuttle most packages to a central sorting and routing facility for subsequent dispatch to various destinations across the United States and the world. A fleet of delivery trucks deliver the packages from local airports to each recipient. At the sender's option, a delivery person may obtain a recipient's signature at the time she delivers the packageâproviding documentation that may later be used to prove the package was in fact received by the intended recipient or someone at his or her home or office.
Federal Express uses automated computer tracking and package handling equipment to route individual packages to their destinations. Delivery information is put into the tracking computer to allow customers and service people to automatically retrieve information about when and to whom particular packages were actually delivered, or where the package happens to be at the moment.
Federal Express and other similar document delivery services have been highly successful because they cost-effectively ensure reliable delivery of original documents and other items. Nevertheless, they do have some significant disadvantages and limitations. For example:
These problems are exacerbated when several individuals and/or organizations in different geographical locations are all parties to a transactionâa complex, multiparty contract, for exampleâand all must sign or otherwise process and/or execute one or more related documents.
Registered Mail
A relatively more secure delivery technique is registered mail. Registered mail correspondents can have a high degree of confidence that their packages will arrive at their required destinationsâbut may not like the time delays and additional expense associated with this special form of mail handling.
To use registered mail, the sender places her document or other items into a sealed envelope or package and takes her package to the nearest Post Office. For security, the Post Office may prohibit the use of resealable tape and mailing labels, and instead require the package to be sealed with paper tape and the address to be written directly on the package. These safeguards help to ensure that any attempts to tamper with the package or its contents will be detected.
The Post Office securely transports the registered mail package to the recipient, requiring each postal employee who accepts custody of the package along its journey to sign and time stamp a custody record. The postal carrier at the recipient's end personally delivers the package to the recipientâwho also has to sign for it and may be asked to produce proof of identification. The custody record establishes a chain of custody, listing every person who has had custody of the package on its journey from sender to recipient.
As discussed above, registered mail is relatively secure and confidential but delivery takes a long time and is very labor and infrastructure intensive.
Facsimile
Facsimile is an electronic-based technology that provides virtually instantaneous document delivery. A facsimile machine typically includes a document scanner, a document printer, and electronic circuits that convert document images to and from a form in which they can be sent over a telephone line. Facsimile requires each of the sender and the intended recipient to have a facsimile machine. The sender typically places the document to be sent into a document feeder attached to a facsimile machine. The sender then typically keys in the telephone number of the intended recipients facsimile machine and presses a âstartâ button. The sender's facsimile machine automatically dials and establishes contact with the recipient's facsimile machine.
Once a good connection is established, the sender's facsimile machine begins to optically scan the document one page at a time and convert it into digital information bits. The sender's facsimile machine converts the digital bits into a form that can be transmitted over a telephone line, and sends the bits to the intended recipient's facsimile machine. The sender's facsimile machine may also send as part of the document, a âheaderâ on the top of each page stating the sender's identity, the page number of the transmission, and the transmission time. However, these headers can be changed at will by the sender and therefore cannot be trusted.
Since the recipient's facsimile machine receives the transmitted information at the same time the sender's facsimile machine is sending it, delivery is virtually instantaneous. However, sending a document to an unattended facsimile machine in an insecure location may result in the document falling into the wrong hands. Another common scenario is that the facsimile machine operator, through human error, dials the wrong telephone number and ends up delivering a confidential document to the wrong person (for example, the local grocery store down the street, or in some unfortunate cases, the opposing side of a negotiation, legal proceeding or other pitched battle). Thousands of faxes are lost every day in a âblack holeâânever arriving at their desired destinations but possibly arriving at completely different destinations instead.
More and more, people are using electronic mail to send documents, messages, and/or other digital items. The âInternet explosionâ has connected millions of new users to the Internet. Whereas Internet electronic mail was previously restricted primarily to the academic world, most corporations and computer-savvy individuals can now correspond regularly over the Internet.
Currently, Internet electronic mail provides great advantages in terms of timeliness (nearly instantaneous delivery) and flexibility (any type of digital information can be sent), but suffers from an inherent lack of security and trustedness. Internet messages must typically pass through a number of different computers to get from sender to recipient, regardless of whether these computers are located within a single company on an âIntranetâ for example, or on Internet attached computers belonging to a multitude of organizations. Unfortunately, any one of those computers can potentially intercept the message and/or keep a copy of it. Moreover, even though some of these systems have limited âreturn receiptâ capabilities, the message carrying the receipt suffers from the same security and reliability problems as the original message.
Cryptography (a special mathematical-based technique for keeping messages secret and authenticating messages) is now beginning to be used to prevent eavesdroppers from reading intercepted messages, but the widespread use of such cryptography techniques alone will not solve electronic mail's inherent lack of trustedness. These electronic mail messages, documents and other items (e.g., executable computer programs or program fragments) that might have been sent with them as âattachments,â remain vulnerable to tampering and other unauthorized operations and uses once decrypted and while delivery may be reported, actual use can not be demonstrated. Some people have tried to develop âprivacy enhancedâ electronic mail, but prior systems have only provided limited improvements in reliability, efficiency and/or security.
The Present Inventions Solve These and Other Problems
As discussed above, a wide variety of techniques are currently being used to provide secure, trusted confidential delivery of documents and other items. Unfortunately, none of these previously existing mechanisms provide truly trusted, virtually instantaneous delivery on a cost-effective, convenient basis and none provide rights management and auditing through persistent, secure, digital information protection.
In contrast, the present inventions provide the trustedness, confidentiality and security of a personal trusted courier on a virtually instantaneous and highly cost-effective basis. They provide techniques, systems and methods that can bring to any form of electronic communications (including, but not limited to Internet and internal company electronic mail) an extremely high degree of trustedness, confidence and security approaching or exceeding that provided by a trusted personal courier. They also provide a wide variety of benefits that flow from rights management and secure chain of handling and control.
The present inventions preferred embodiment make use of a digital Virtual Distribution Environment (VDE) as a major portion of its operating foundation, providing unique, powerful capabilities instrumental to the development of secure, distributed transaction-based electronic commerce and digital content handling, distribution, processing, and usage management. This Virtual Distribution Environment technology can flexibly enable a wide variety of new business models and business practices while also supporting existing business models and practices.
The Virtual Distribution Environment provides comprehensive overall systems, and wide arrays of methods, techniques, structures and arrangements, that enable secure, efficient electronic commerce and rights management on the Internet and other information superhighways and on internal corporate networks such as âIntranetsâ. The present inventions use (and in some cases, build upon and enhances) this fundamental Virtual Distribution Environment technology to provide still additional flexibility, capabilities, features and advantages. The present invention, in its preferred embodiment, is intended to be used in combination a broad array of the features described in Ginter, et al, including any combination of the following:
For example, parties using the Virtual Distribution Environment can participate in commerce and other transactions in accordance with a persistent set of rules they electronically define. Such techniques, systems and arrangements bring about an unparalleled degree of security, reliability, efficiency and flexibility to electronic commerce, electronic rights management and other important business models. The present inventions make use of these persistent electronic rules to provide secure, automated, cost-effective electronic control for electronic document and other digital item handling and/or delivery, and for the electronic formation and negotiation of legal contracts and other documents.
By way of non-exhaustive summary, these present inventions provide a highly secure and trusted item delivery and agreement execution services providing the following features and functions:
The present inventions also provide for the use of a trusted third party electronic go-between or intermediary in various forms, including the âvirtual presenceâ of such go-between through the rules and controls it contributes for distributed governance of transactions described in the present invention, and further through the use of a distributed, go-between system operating in on-line and/or off-line modes at various user and/or go-between sites. Such a trusted third-party go-between can provide enhanced and automated functionality, features and other advantages such as, for example:
These and other features and advantages provided by the present invention will become better and more completely understood by studying the following detailed description of presently preferred exemplary embodiments in conjunction with the drawings, of which:
FIG. 1 illustrates an example of a âVirtual Distribution Environmentâ;
FIG. 1A is a more detailed illustration of an example of the âInformation Utilityâ shown in FIG. 1 ;
FIG. 2 illustrates an example of a chain of handling and control;
FIG. 2A illustrates one example of how rules and control information may persist from one participant to another in the FIG. 2 chain of handling and control;
FIG. 3 shows one example of different control information that may be provided;
FIG. 4 illustrates examples of some different types of rules and/or control information;
FIGS. 5A and 5B show an example of an âobjectâ;
FIG. 6 shows an example of a Secure Processing Unit (âSPUâ);
FIG. 7 shows an example of an electronic appliance;
FIG. 8 is a more detailed block diagram of an example of the electronic appliance shown in FIG. 7 ;
FIG. 9 is a detailed view of an example of the Secure Processing Unit (SPU) shown in FIGS. 6 and 8 ;
FIG. 10 shows an example of a âRights Operating Systemâ (âROSâ) architecture provided by the Virtual Distribution Environment;
FIGS. 11A-11C show examples of functional relationship(s) between applications and the Rights Operating System;
FIGS. 11D-11J show examples of âcomponentsâ and âcomponent assembliesâ;
FIG. 12 is a more detailed diagram of an example of the Rights Operating System shown in FIG. 10 ;
FIG. 12A shows an example of how âobjectsâ can be created;
FIG. 13 is a detailed block diagram of an example the software architecture for a âprotected processing environmentâ shown in FIG. 12 ;
FIGS. 14A-14C are examples of SPU memory maps provided by the protected processing environment shown in FIG. 13 ;
FIG. 15 illustrates an example of how the channel services manager and load module execution manager of FIG. 13 can support a channel;
FIG. 15A is an example of a channel header and channel detail records shown in FIG. 15 ;
FIG. 15B is a flowchart of an example of program control steps that may be performed by the FIG. 13 protected processing environment to create a channel;
FIG. 16 is a block diagram of an example of a secure data base structure;
FIG. 17 is an illustration of an example of a logical object structure;
FIG. 18 shows an example of a stationary object structure;
FIG. 19 shows an example of a traveling object structure;
FIG. 20 shows an example of a content object structure;
FIG. 21 shows an example of an administrative object structure;
FIG. 22 shows an example of a method core structure;
FIG. 23 shows an example of a load module structure;
FIG. 24 shows an example of a User Data Element (UDE) and/or Method Data Element (MDE) structure;
FIGS. 25A-25C show examples of âmap metersâ;
FIG. 26 shows an example of a permissions record (PERC) structure;
FIGS. 26A and 26B together show a more detailed example of a permissions record structure;
FIG. 27 shows an example of a shipping table structure;
FIG. 28 shows an example of a receiving table structure;
FIG. 29 shows an example of an administrative event log structure;
FIG. 30 shows an example inter-relationship between and use of the object registration table, subject table and user rights table shown in the FIG. 16 secure database;
FIG. 31 is a more detailed example of an object registration table shown in FIG. 16 ;
FIG. 32 is a more detailed example of subject table shown in FIG. 16 ;
FIG. 33 is a more detailed example of a user rights table shown in FIG. 16 ;
FIG. 34 shows a specific example of how a site record table and group record table may track portions of the secure database shown in FIG. 16 ;
FIG. 34A is an example of a FIG. 34 site record table structure;
FIG. 34B is an example of a FIG. 34 group record table structure;
FIG. 35 shows an example of a process for updating the secure database;
FIG. 36 shows an example of how new elements may be inserted into the FIG. 16 secure data base;
FIG. 37 shows an example of how an element of the secure database may be accessed;
FIG. 38 is a flowchart example of how to protect a secure database element;
FIG. 39 is a flowchart example of how to back up a secure database;
FIG. 40 is a flowchart example of how to recover a secure database from a backup;
FIGS. 41A-41D are a set of examples showing how a âchain of handling and controlâ may be enabled using âreciprocal methodsâ;
FIGS. 42A-42D show an example of a âreciprocalâ BUDGET method;
FIGS. 43A-43D show an example of a âreciprocalâ REGISTER method;
FIGS. 44A-44C show an example of a âreciprocalâ AUDIT method;
FIGS. 45-48 show examples of several methods being used together to control release of content or other information;
FIGS. 49, 49A-49F show an example OPEN method;
FIGS. 50, 50A-50F show an example of a READ method;
FIGS. 51, 51A-51F show an example of a WRITE method;
FIG. 52 shows an example of a CLOSE method;
FIGS. 53A-53B show an example of an EVENT method;
FIG. 53C shows an example of a BILLING method;
FIG. 54 shows an example of an ACCESS method;
FIGS. 55A-55B show examples of DECRYPT and ENCRYPT methods;
FIG. 56 shows an example of a CONTENT method;
FIGS. 57A and 57B show examples of EXTRACT and EMBED methods;
FIG. 58A shows an example of an OBSCURE method;
FIGS. 58B, 58C show examples of a ELECTRONIC FINGERPRINT method;
FIG. 59 shows an example of a DESTROY method;
FIG. 60 shows an example of a PANIC method;
FIG. 61 shows an example of a PNTER method;
FIG. 62 shows an example of a key âconvolutionâ process;
FIG. 63 shows an example of how different keys may be generated using a key convolution process to determine a âtrueâ key;
FIGS. 64 and 65 show an example of how protected processing environment keys may be initialized;
FIGS. 66 and 67 show example processes for decrypting information contained within stationary and traveling objects, respectively;
FIG. 68 shows an example of how a protected processing environment may be initialized;
FIG. 69 shows an example of how firmware may be downloaded into a protected processing environment;
FIG. 70 shows an example of multiple VDE electronic appliances connected together with a network or other communications means;
FIG. 71 shows an example of a portable VDE electronic appliance;
FIGS. 72A-72D show examples of âpop-upâ displays that may be generated by the user notification and exception interface;
FIG. 73 shows an example of a âsmart objectâ;
FIG. 74 shows an example of a process using âsmart objectsâ;
FIGS. 75A-75D show examples of data structures used for electronic negotiation;
FIGS. 75E-75F show example structures relating to an electronic agreement;
FIGS. 76A-76B show examples of electronic negotiation processes;
FIG. 77 shows a further example of a chain of handling and control;
FIG. 78 shows an example of a VDE ârepositoryâ;
FIGS. 79-83 show an example illustrating a chain of handling and control to evolve and transform VDE managed content and control information;
FIG. 84 shows a further example of a chain of handling and control involving several categories of VDE participants;
FIG. 85 shows a further example of a chain of distribution and handling within an organization;
FIGS. 86 and 86 A show a further example of a chain of handling and control; and
FIG. 87 shows an example of a virtual silicon container model.
FIG. 88 shows an example trusted electronic delivery system;
FIG. 89 shows a detailed view of an example electronic intelligent kiosk appliance;
FIGS. 90A and 90B show example options the sender can select for electronic delivery;
FIG. 91A shows example steps to send an item;
FIG. 91B shows example steps to receive an item;
FIGS. 92 and 92 A show example trusted electronic delivery providing a return receipt;
FIG. 93 shows example trusted item delivery from an intelligent kiosk to a personal computer;
FIGS. 94 & 95 show examples of trusted electronic delivery between personal computers;
FIG. 96 shows an example trusted item handling and delivery within an organization;
FIG. 97 shows an example trusted electronic document execution;
FIG. 98 shows an example multi-party electronic document execution;
FIG. 99 shows an example trusted electronic go-between;
FIG. 100 shows an example use of the trusted electronic go-between for notarizing and/or archiving;
FIG. 101 shows an example electronic legal contract execution using a trusted electronic go-between;
FIG. 101A shows an example electronic requirements list;
FIG. 101B shows an example multi-party electronic legal contract execution using a trusted electronic go-between;
FIG. 102 shows example use of trusted electronic go-betweens within and outside of organizations;
FIG. 103 illustrates an example secure object;
FIG. 104 shows example electronically-generated signatures, seals and electronic fingerprints;
FIG. 105A shows an example way of hiding information within line spacing;
FIG. 105B shows an example way of hiding information within letter spacing;
FIG. 105C shows an example electronic fingerprint;
FIGS. 106A-106C show example electronically generated seals;
FIGS. 107A and 107B show detailed electronically generated seal examples;
FIG. 108 shows an example process for creating digital information for encoding into an item or item seal;
FIG. 109 shows an example electronic appliance;
FIGS. 110-113 show example processes for securely sending an item;
FIG. 113A shows an example routing slip data structure;
FIG. 113B shows an example audit trail data structure;
FIG. 114A-118 show example processes for securely receiving an item;
FIG. 119 shows an example architecture for a trusted electronic go-between;
FIGS. 120A-120B show example reciprocal control set usage to provide a trusted electronic go-between having secure electronic notarization capabilities;
FIG. 121 shows example steps performed by a trusted third party go-between to receive an item;
FIGS. 122 and 123 show example trusted go-between processes;
FIGS. 124A-124B and 125A-125B show example contract execution processes;
FIG. 126 shows an example automobile purchase providing electronic contract execution through a trusted electronic go-between;
FIG. 127 shows an example use of a trusted electronic go-between to provide electronic item notarization;
FIG. 128 shows an example secure item delivery with real time teleconferencing capabilities;
FIG. 129 shows a health insurance example;
FIG. 130 shows an example real estate âatomicâ settlement;
FIG. 130A shows example transaction rules;
FIG. 131 shows an example judicial electronic data interchange (EDI);
FIG. 132 shows an example Patent Office automation;
FIG. 133 shows an example tax filing; and
FIG. 134 shows an example using facsimile transmission.
The entire disclosure of the above-referenced Ginter et al. patent specification is incorporated by reference in connection with FIGS. 1-87 .
FIG. 88 shows an electronic trusted delivery system 4050. In this example, sender 4052 is sending an item 4054 to a recipient 4056 over an electronic network 4058. In this example, electronic delivery over network 4058 is by way of a secure, trusted electronic delivery virtual distribution environment transport mechanism 4060 which is shown for purposes of illustration as an electronic delivery person Delivery person 4060 is shown as a human being for purposes of illustration, but in the example is actually an automatic, trusted electronic delivery means supported and provided by virtual distribution environment 100.
Item 4054 might be a document such as a handwritten or typed letter, or it could be a legal document such as a contract. It could have both text and pictures, just text or just pictures. It could be a sound recording, a multimedia presentation, or a visual work such as a film or television program. Item 4054 could be any item or information capable of being represented in digital form. The item 4054 can be initially presented to the appliance 600 in electronic form (for example, on a diskette), or the appliance can convert it from some other form into electronic form.
Electronic delivery person 4060 receives item 4054 in digital form and places it into a secure electronic container 302âthus forming a digital âobjectâ 300. A digital object 300 may in this case be, for example, as shown in FIGS. 5A and 5B , and may include one or more containers 302 containing item 4054. FIG. 88 illustrates secure electronic container 302 as an attaché case handcuffed to the secure delivery person's wrist. Once again, container is shown as a physical thing for purposes of illustration onlyâin the example it is preferably electronic rather than physical, and comprises digital information having a well-defined structure (see FIG. 5A ). Special mathematical techniques known as âcryptographyâ can be used to make electronic container 302 secure so that only intended recipient 4056 can open the container and access the electronic document (or other item) 4054 it contains.
In this example, sender 4052 sends item 4054 by supplying the document to an electronic appliance 600A. In this example, electronic appliance 600A is an intelligent electronic walk-up kiosk that may be located in a public place or on private property, such as the offices or work areas of a firm. Appliance 600A in this example has a document slot 4102 into which sender 4052 can feed item 4054. Electronic appliance 600A can automatically, optically scan the item 4054, and convert it into digital information for sending over an electronic connection or network 4058 (such as, for example, electronic highway 108 shown in FIG. 2 ). The item 4054 can be sent to one or many recipients specified by sender 4052.
FIG. 89 shows an example appliance 600A in the form of an intelligent walk-up kiosk. This example kiosk appliance 600A could be installed in an office building lobby, shopping mall, office supply store, or other public place for walk-up use by members of the public. It could also be installed in a location within a corporate or business office (e.g., a mail room) for use by company employees. The kiosk appliance 600A is an example. Aspects of the present invention can be used with other types of electronic appliances such as personal computers or computer workstations for example (ee FIGS. 7 and 8 , and 93-93C for example).
Referring to FIG. 89 , the example kiosk appliance 600A can include a computer screen 4104 for displaying informational messages, and user operable controls 41106 such as push buttons for allowing sender 4052 to select between delivery options. Appliance 600 in this example may also include a card reader 4108 for reading a credit card or other kind of card provided by the sender 4052. Additionally, if desired, electronic appliance 600A may include a telephone receiver 4110 and telephone dialing keypad 4112 (or other input devices) to allow sender 4052 to get information and assistance or give additional instructions. Electronic appliance 600A may optionally include a keyboard for entering textual and other information (not shown).
Also as shown in FIG. 89 , electronic appliance 600A may optionally include a video camera 4124 and may display remote video in a âwindowâ 4126 on screen 4104 (or on an optionally separate screen not shown). Camera 4124 allows appliance 600 to take a photograph of sender 4052 and/or recipient 4056. It may also allow sender 4052 and recipient 4056 to see each other in order to simultaneously authenticate each other's identity visuallyâand to have a âteleconferenceâ discussion about item 4054 or other matters. The electronic appliance 600 may also have a microphone/ speaker 4140 perhaps to coordinate details of the pending transaction. Appliance 600A might also include a media reader 413 to read from a floppy diskette, smart card or other digital storage device. The appliance 600 can include, in addition, a document shredder/ destroyer 4115.
Also as shown in FIGS. 88 and 89 , appliance 600A in this example has a secure processing unit (SPU) 500 (see FIG. 6 ). SPU 500 provides a tamper-resistant protected processing environment (âPPEâ) in which processes and transactions can take place securely and in a trusted fashion.
FIG. 91A shows example steps for sending an item such as item 4054. To send item 4054 to recipient 4056, sender 4052 may first press buttons 4106 and read display 4104 to select between different delivery options (see FIG. 91A , step 4090A). FIG. 90A shows some example service options, and FIG. 90B shows some more detailed delivery options. For example, sender 4052 might press a button corresponding to âdelivery options,â which might cause appliance 600A to display the FIG. 90A menu screen of various delivery options. These delivery options could include, for example:
Electronic appliance 600A may also ask the user to identify intended recipient 4056 ( FIG. 91A , step 4090B). Sender 4052 may select different ways to identify recipient 4056 based on the confidentiality of the document and the level of security the sender is willing to pay for. In one example, sender 4052 might require the recipient's appliance 600B to require recipient 4056 to prove that he is who he says he is. This secure âauthenticationâ function might be met by, for example, requiring recipient 4056 to input a password, present digital proof of identity using, for example:
Sender 4052 may also specify the electronic address of recipient 4056, or it might let system 4050 automatically, securely and confidentially locate the recipient using a secure directory service as described in the copending Shear et al. application.
Once sender 4052 has selected the service options she desires, appliance 600 may next display a message on computer screen 4104 asking sender 4052 to insert item 4054 into document slot 102 for electronic scanning. When the sender 4052 inserts the document 4054 or other item ( FIG. 91A , block 4030C), electronic appliance 600 may (if necessary) automatically, optically scan item 4054 to create an electronic, digital form of the document (using conventional optical scanning and optical character recognition technology, for example). During this scanning process, appliance 600 might display a message on computer screen 4104 such as âI am scanning your document now . . . â Instead of feeding in a document, the sender might provide the document or other item in digital form by inserting a floppy diskette or smart card into reader 4132, or by connecting a portable computer up to port 4130 and having the portable computer âuploadâ the document into appliance 600.
The item 4054 to be sent need not be a document, but could be any type of item capable of being transformed into digital form such as, for example:
After appliance 600 has scanned or otherwise received the entirety of document 4054 or other item, appliance 600 may calculate and display a total price on computer screen 4104 and ask sender 4052 to pay for the service ( FIG. 91A , block 4090D). The calculated price may, for example, depend in part on the size and/or number of items to be securely delivered. The appliance may then ask sender 4052 to confirm she wishes to send the document to the recipient 4056 FIG. 91A , block 4090E). Upon receiving that confirmation ( FIG. 91A , âyâ exit to decision block 4090E), appliance 600 may request sender 4052 to pay, for example, by inserting her credit card into card reader 4108 as a form of payment, or it might use other payment arrangements ( FIG. 9 aA, block 4090F). Appliance 600 may then package the digital form of document into secure electronic container 302 and send it over electronic network 4058 for secure delivery to recipient 4056 ( FIG. 91A , block 4090F). Because system 4050 uses the secure âvirtual distribution environmentâ 100, sender 4052 can have a high degree of confidence and trust that item 4054 will be usable only by intended recipient(s) 4056 and to no one else.
FIG. 91B shows example steps for receiving an item. Intended recipient 4056 may receive delivery of the document by walking up to the same or different electronic appliance intelligent kiosk 600B and operate controls 4106 instructing the appliance to deliver the document to him ( FIG. 91B , block 4092A). Depending upon the delivery options sender 4052 selected, appliance 600 may require recipient 4056 to prove he is who he says he is ( FIG. 91B , block 4092B). For example, appliance 600B may require recipient 4056 to provide a secret password and/or it may require the recipient to insert a special card into card reader 108. This special card may certify the identity of recipient 4056. Appliance 600B might also take the recipient's picture using camera 4124, and automatically compare the picture with a known photographic image of the recipient to see if they match. Once appliance 600 is satisfied regarding the identity of recipient 4056, it may require the recipient to pay ( FIG. 91B , block 4092C)âsuch as for example in a âcollect on deliveryâ model. The appliance 600 may then open the secure electronic container (âattaché caseâ) 302 and deliver the item it contains to recipient 4056 ( FIG. 91B , block 4092D). For example, if the container 302 contains item 4054, prints the copy of the document, and provides the printed copy through document slot 4102. It could also give recipient 4056 a digital copy of the item 4054 (such as a document) via media drive 4132 and/or port 4130. Appliance 600B may deliver the digital copy of item 4054 within a container 302 and/or may protect the item with seals, electronic fingerprints, watermarks and/or other visible and/or hidden markings to provide a âvirtual containerâ or some of the security or other characteristics of a container (for example, the ability to associate electronic controls with the item).
Example Electronic Delivery and Return Receipt
FIG. 92 illustrates one example delivery of item 4054 to recipient 4056. In this example, the virtual electronic delivery person 4060 demands to see a certificate or token 4064 proving that recipient 4056 is the same person sender 4052 designated to receive item 4054 ( FIG. 91B , block 4092B). Recipient 4056 could provide this certificate 4064 by, for example, supplying a âsmartâ electronic card containing the certificate in digital form. Alternatively or in addition; if sender 4052 so required, electronic delivery person 4060 might require stronger forms of personal authentication such as, for example, a voice print, fingerprint or handprint test, identification based on other physical (biometric) characteristics such as face profile, retinal or iris patterns of the eye, or the like.
There are advantages to using multiple authentication techniques in combination. For example, a well made certificate is essentially unforgeable (which is to say, it would be easier to fabricate a electronic fingerprint carrying device, for example, than a well made certificate 4064 barring unforeseen advances in mathematics), but the trouble with certificates is the weakness of correlation between physical access (e.g., holding the card, or sitting at the appliance) and permission to use. Passwords are a weak form of authenticationâthat is, establishing this correlation. Biometric techniques, particularly iris and retinal scans, are stronger forms of authentication. It is possible for biometric information to be encoded in a field of a certificate 4064, and for the software controlling the card to confirm that the biometric input is consistent with the field in the certificate prior to authorizing use of the certificate or the card in general. This authentication may be limited in time (e.g., using an inactivity time out, each time the card is inserted, etc.) In addition, a transaction might require this authentication to occur simultaneous with use (rather than for an entire session, even if the card only requires one authentication per session).
After payment has been arranged ( FIG. 91B , block 4092C), electronic delivery person 4060 will open secure container 302 and give recipient 4056 a printed and/or electronic copy of item 4054 only once he is satisfied to the degree required by sender 4052âthat the recipient 4056 is the correct person.
Electronic delivery person 4060 may also note various information about the delivery (illustrated here by having him write the information down on a clipboard 4066, but implemented in practice by electronically storing an âauditâ trail). System 4050 mayâbased on the particular receipt options sender 4052 requestedâprovide the sender with an electronic and/or paper receipt of the type shown in FIG. 92A , for example ( FIG. 91B , step 4092D). Such an example receipt 4066 might specify, for example:
The sender's electronic appliance 600A and the recipient's electronic appliance 600B can report their respective âaudit trailsâ periodically or upon completion of delivery or some other event. They can report the audit information to a support facility such as information utility usage analyst 200C (see FIG. 1A ). Usage analyst 200C can work with report creator 200D to issue a written or electronic report to sender 4052. Alternatively, since electronic appliances 600A, 600B are secure, the electronic appliances can maintain copies of the audit trail(s) and produce them in secure form on demand at a later date to evidence or prove that the document was sent and delivered (for example, so sender 4052 can't deny she sent the item and recipient 4056 can't deny he received the item). The appliances 600A, 600B could store an entire copy of the item 4054, or they could instead store a âmessage digestâ that could later be used to securely prove which item was sent.
Other Types of Electronic Appliances can be Used
As mentioned above, the kiosk appliances 600 shown in FIGS. 88 and 89 are just one example of electronic appliances that can be used for secure document delivery.
Secure electronic delivery can also be from one personal computer 4116 to another. FIGS. 93-96 show that system 4050 can be used to deliver documents securely between various different kinds of electronic appliancesâpersonal computers, for example.
FIG. 93 shows that electronic kiosk appliance 600A may send item 4054 to a different type of electronic appliance 600C such as a personal computer 4116 having a display 4120, a keyboard 4118 and a pointer 4122. Personal computer 4116 in this example is also provided with a secure processing unit 500 or software based HPE 655 (See FIG. 12 ) to provide secure, tamper-resistant trusted processing. In this example, kiosk appliance 600A and personal computer appliance 600C are both part of virtual distribution environment 100 and are interoperable with one another in a secure fashion.
Secure delivery can also be from one personal computer 4116 to another. FIG. 94 shows a sender 4052 inputting item 4054 into an optical scanner 4114 connected to a personal computer 4116. Electronic delivery person 4060 can deliver the electronic version of item 4054 within secure container attaché case 302 from personal computer 4116Ⲡto another personal computer 4116 operated by recipient 4056.
FIG. 95 shows that the item 4054 delivered by electronic delivery person 4060 need not ever exist in paper form. For example, sender 4052 might input digital information directly into personal computer 4116â² through keyboard 4118âor the item could originate from any other secure or non-secure digital source. Sender 4052 may then cause electronic delivery person 4060 to deliver this digital item 4054 to the recipient 4056's personal computer 4116 for viewing on display 4120 and/or printing on printer 4122. Item 4054 can also be inputted from and/or outputted to a floppy diskette or other portable storage medium, if desired. As mentioned above, item 4054 can be any sort of digital information such as, for example text, graphics, sound, multi-media, video, computer software. The electronic delivery functions can be provided by software integrated with other software applications (e.g., electronic mail or word processing) executing on personal computer 4116.
FIG. 96 shows an example in which multiple electronic appliances 600(1), . . . , 600(N), 600A and 600B communicate with a secure electronic delivery computer âserverâ 4150 over a network 4152. For example, appliances 600(1), . . . , 600(N) may each be a personal computer or other workstation 4116. Appliance 600A may be, for example, a network facsimile device including a document scanner and document printer. Appliance 600B may be one or more additional âserversâ of various types. Each of these various appliances 600 may use secure electronic delivery server 4150 to provide secure electronic item delivery and handling services. Server 4150 may include a secure processing unit 500 (PPE) interoperable with other VDE-capable electronic appliances, and may communicate with such other electronic appliances over a communications link 4154 such as the Internet or other electronic network. Each of the other appliances 600 may also include an SPU 500 (PPE) if desired to provide security and interoperability with other VDE-capable devices over network 4152.
Electronic Execution of a Legal Document
FIG. 97 shows that trusted delivery system 4050 can also be used to electronically execute a legal contract 4068. In many cases it may be very inconvenient for the parties 4070A, 470B to a legal contract 4068 to meet face-to-face and physically sign the contract. For example, one of the contracting parties may be geographically distant from the other. It may nevertheless be important for the contract 4068 to be finalized and executed rapidly, reliably and in a manner that cannot be repudiated by either party.
System 4050 supports âsimultaneousâ as well as non-simultaneous contract or other document execution among contracting parties 4070. Simultaneous completion allows multiple parties located in physically different locations to directly and simultaneously participate in the execution of legal documents and/or other transactions that require authorizations.
Currently, businesses often prefer simultaneous execution of documents at what is called a âclosing.â Such closings for important documents frequently require the presence of all participants at the same location to simultaneously sign all necessary legal documents. Business executives are often reluctant to sign a set of documents and then send them to the next party to sign, since special legal language may be required to release the first (or early) signing party if the documents are not quickly signed by other participants and since certain liabilities may exist during this interim period.
FIG. 97 shows an example in which two contracting parties 4070A, 4070B each simultaneously sit down in front of an electronic appliance 600 such as a personal computer or intelligent electronic kiosk. Each of the contracting parties 4070 may be required to securely identify themselves by, for example, inserting a card 4109 into a card reader 4108 and/or by allowing a biometric sensor 4124 to scan a part of their body such as a finger print or a retina patternâthereby proving that they are who they say they are.
One relatively weak form of authentication is physical possession of the card 4109. Nonetheless, if some form of weak authentication is used and biometric information is gathered in real time by sensor 4124, it may be correlated with some trusted record stored elsewhere, and/or delivered along with the item 4054. If biometric information is codelivered with the item 4054, and it is ever actually used, it must be correlated with a trusted record (this trusted record could, for example, be generated by the person providing biometric data in the presence of a trusted party if the validity of a transaction is called into question, at the sacrifice of significant automation and âcommercial confidenceâ benefits). The ability to establish trust as the transaction occurs, rather than having some degree of nonrepudiation later (imagine if the transaction were fraudulent, and a user relied on the person showing up to give a retinal scan) is one significant benefit of example system 4050.
If the parties are simultaneously at their respective electronic appliances 600, they may verify each other's identity using video cameras and screens built into the kiosk. Such simultaneous execution has the advantage of allowing multiple parties at different physical locations to negotiate a deal in real time and then simultaneously, reliably execute and receive final, signed agreement copies that are valid and legally binding.
Trusted delivery mechanism 4060 may send messages such as offers 4054A and acceptances 4054B between the two electronic appliances 600A, 600B. These messages may be packaged within secure electronic containers 302. Some of these may be human readable, others may be automated as in FIGS. 76A and 76B . If they are human readable and operator managed during negotiation, they may represent a user interface aspect of control structures (e.g., see load module DTD description in connection with FIG. 23 , and pop up user interface usage in connection with FIG. 72C ).
Once the parties 4070A, 4070B agree on the terms of the contract, they may securely indicate their agreement and system 4050 can generate an electronic and/or paper contract document 4068 that evidences and memorializes the agreement. As will be discussed below, contract document 4068 may have special attributes such as seals 4200, hand-written signatures 4300 and/or visual or hidden âelectronic fingerprintâ information 4400. Such seals 4200, signatures 4300 and electronic fingerprints 4400 can be used to establish the authenticity of the document (for example, preventing a signatory from repudiating it and to allowing it to be admitted as evidence in a court of law).
FIG. 98 shows that system 4050 can be used to electronically form contract 4068 between any number of different parties. Electronic network 4058 might, for example, be a world-wide electronic highway 108 or other network such as the Internet, with the various parties being located in many different locations around the world. Alternatively, electronic network 4058 might be a private data network within an organizationâor it might be a mixture of the two. Different contracting parties 4070 may use different kinds of electronic appliances 600 such as, for example, personal computers, intelligent walk-up kiosks, home television sets, or any other type of electronic appliance capable of securely receiving and providing information about contract 4068.
System 4050 can electronically pass contract 4068 along a âchainâ from one party 4070 to the next (âRound Robinâ), collecting signatures as it travels along. System 4050 can also allow each party 4070A-4070F to communicate with any other party. One copy of contract 4068 could be passed along from party to party and iteratively signed at the respective signers' locations. The last signer could then broadcast final, signed copies of contract 4068 to all parties. The electronic containers 302 can specify who the next recipient of contract isâforming a trusted chain of handling and control for contract 4068.
In one example, all of the parties 4070 may be required to hit an âI Agreeâ button (e.g., by placing a finger onto a biometric sender 4124 shown in FIG. 97 , âclickingâ on a displayed âI agreeâ icon, etc.) before this transaction is actually carried out. Then, barring a system failure, the execution is effectively simultaneous, since it isn't initiated until everyone has indicated their approval, and won't be completed unless each system performs correctly.
Trusted Electronic Go-Between
FIG. 99 shows that system 4050 may introduce a trusted electronic âgo-betweenâ or intermediary 4700 between the sender 4052 and recipient 4056 (and/or between two or more contracting parties 4070). Trusted go-between 4700 acts as an impartial overseer who can document a transaction, and may also become actively involved in directing the transaction to see to it that it is completed properly. Trusted electronic go-between 4700 may provide valuable third party services such as, for example:
The drawings show the trusted go-between 4700 as a person for purposes of illustration only. In the preferred example, trusted go-between 4700 may be a computer that performs its functions electronically in a highly automatic and efficient way. In one example, the computer's capabilities may be augmented by human participation.
FIG. 100 shows one example use of a trusted electronic go-between 4700 to assist in delivering an item such as document 4054 from sender 4052 to recipient 4056. In this example, sender 4052 may send the item 4054 directly to recipient 4056 within one or more secure electronic containers 302. Alternatively, sender 4052 can send item 4054 (or a copy of it) to trusted electronic go-between 4700 within a secure electronic container 302A. When the trusted electronic go-between 4700 receives container 302A, she may be authorized to open the container, remove item 4054 and affix her seal 4200 to the document. Seal 4200 may certify, notarize and/or âdate stampâ the item 4054 as having been received and seen by trusted electronic go-between 4700 on a certain day at a certain time. Trusted electronic go-between 4700 may keep a copy of item 4054 within a secure electronic library or archive 4702 [BW1]. In addition, if desired, trusted electronic go-between 4700 may deliver a copy of item 4054 with the affixed seal 4200 to recipient 4056. When recipient 4056 opens the secure electronic container 302B, he will notice the seal 4200 and have confidence that it is the same item 4054 that was seen and archived by the trusted electronic go-between 4700. In this example, recipient 4056 may directly provide a return receipt 4066 within an additional secure electronic container 302Câor trusted electronic go-between 4700 can provide such a return receipt to sender 4052 based on audit information provided by recipient 4056 and/or originated by the trusted go-between.
The Trusted Electronic Go-Between can Help with Contracts
FIG. 101 shows how trusted electronic go-between 4700 can make it easier for parties 4070 to execute a legal contract 4068. In this example, the trusted electronic go-between 4700 can maintain a requirements list 4704. This requirements list 4704 (an example of which is shown in FIG. 101A ) may specify all of the steps that must be completed and all of the conditions that must be satisfied in order to execute legal contract 4068. Trusted electronic go-between 4700 can monitor the electronic communications between the contractual parties 4070A, 4070B, and notify them of additional requirements that need to be met before the contract 4068 can be signed.
In one example, trusted electronic go-between 4700 can also act as a mediator to resolve disputes between the contracting parties 4070A, 4070B, and can help negotiate the contract. At the conclusion of the contracting process, trusted electronic go-between 4700 may affix its own seal 4200A to the executed contract document 4068. This seal 4200A may provide a guarantee or assurance that all of the steps required by trusted electronic go-between 4700 were fulfilled before the contract 4068 was executed and that the contracting parties 4070A, 4070B are who they say they are and had authorization to execute the contract.
FIG. 101B shows how the trusted electronic go-between 4700 could be the focal point for a contractual relationship between a number of different contracting parties. In this example, trusted electronic go-between 4700 might communicate directly with each of the various contracting parties 4070 via electronic digital messages, and create the resulting executed contract based on these communications. In one example, go-between 4700 doesn't tell any participant 4070 who has already agreed and who hasn't. The SPU's 500 (PPEs) of each party's appliance 600 can receive administrative objects (see FIG. 21 ) with the information about each approval, yet this information does not need to be released outside the SPU (PPE). In this model, the rules associated with affixing electronic signatures (digital and/or an image of a physical signature) can be established at the beginning of the negotiation to indicate the list of parties 4070 that must agree. Then, as each party 4070 agrees, their electronic appliance SPU 500 (PPE) will send administrative objects to each of the other participants containing one or more events and data associated with those events that can be processed by the controls associated with use of their signature. If the administrative objects omit the creator identity public header 804 information (see FIG. 17 ), and the information is transmitted via a remailer (or other intermediary) when network addresses could be used to identify a sender, there will be no way to determine the identity of the sender outside the SPU (PPE) 500. As soon as all of the conditions for use of the signature have been fulfilled, and an event is presented to sign the document, the rest of the transaction can go forward.
It is extremely useful to have trusted go-between 4700 monitoring this activity to order the application of signatures (if required), and to allow a roll back if the system fails before applying all of the signatures. The role of go-between 4700 may, in some circumstances, be played by one of the participant's SPU's 500 (PPEs), since SPU (PPE) behavior is not under the user's control, but rather can be under the control of rules and controls provided by one or more other parties other than the user (although in many instances the user can contribute his or her own controls to operate in combination with controls contributed by other parties). In another example, the go-between role 4700 may comprise a âvirtual go-betweenâ comprised of a one, a combination of plural, or all, nodes of participants in a collective or other group. Governance can be shared through the interaction of rules and controls of the various node PPEs producing a go-between control role. Upon the completion of a go-between managed transaction, transaction audit information for archive, billing, security, and/or administrative purposes may be securely transmitted, directly, or through one or more other participating in the virtual go-between.
The Secure Electronic Go-Between can be Used Within and Between Organizations
FIG. 102 shows an example use of system 4050 for inter- and intra-organizational communications. FIG. 102 shows an organization A (left-hand side of the drawing) as having an âIntranetâ (a private data network within a particular organization) 5100(4A). Intranet 5100(A) may be a local and/or wide area network for example. User nodes 600(A)(1), . . . , 600(A)(N) (for example, employees of organization A) may communicate with one another over Intranet 5100(A).
FIG. 102 also shows another organization B that may have its own Intranet 5100(B), user nodes 600(B)(1), . . . , 600(B)(N), and private trusted go-between 4700(B). In addition, FIG. 102 shows a public data network 5104 (such as the Internet for example) and a public trusted go-between 4700(C). FIG. 102 shows that in this example, organizations A and B communicate with the outside world through trusted go-between 4700(A), 4700(B) (which may, if desired, also include âgatewaysâ, âfirewallsâ and other associated secure communications components). In other examples, trusted go-between 4700(A), 4700(B) need not be the actual âgatewayâ and âfirewallâ to/from Internet 5104, but could instead operate wholly internally to the respective organizations A, B while potentially generating electronic containers 302 for transmission over Internet 5104.
In this example, organization A user nodes 600(A)(1), . . . , 600(A)(N) each have an instance of a virtual distribution environment protected processing environment, and can communicate with one another over Intranet 5100(A) via secure electronic containers 302. Similarly, organization A user nodes 600(B)(1), . . . , 600(B)(N) each have an instance of a virtual distribution environment protected processing environment, and can communicate with one another over Intranet 5100(B) via secure electronic containers 302. In addition, organization A and organization B can communicate with one another over Internet 5104 via secure electronic containers 302.
Organization A's private trusted go-between 4700(A) may be used for facilitating organization A's internal communications and processes. Private trusted go-between 4700(A) might be used, for example, to carefully track documents and other items sent from one user to another within organization A. The public go-between 4700(C), meanwhile, can be used to coordinate between organization A and organization B without, for example, revealing confidential information of either organization to the other organization. Below are more detailed examples of how the FIG. 102 arrangement might be advantageously used to conduct business transactions.
More about the Secure Electronic Container
FIG. 103 shows an example secure electronic object 300 and its contents. Once again, although object 300 is shown as a locked attaché case for illustration purposes, the object and its associated container 302 is typically electronic rather than physical and may provide security, trustedness and confidentiality through use of strong cryptographic techniques as shown in FIGS. 5A, 5B and 17-26B.
In this example, secure container 302 may contain a digital image 4068I of a document or other item 4054 to be delivered from one party to another. This image may include one or more seals 4200, one or more hand-written signatures 4300, and one or more electronic fingerprints 4400. The item 4054 may be multiple pages long or it may be a single page. The item 4054 may contain text, pictures or graphical information, computer instructions, audio data, computer data, or any combination of these, for example. Image 4068I may be represented in a so-called âuniversalâ format to allow it to be created and displayed and/or printed by any standard software application capable of processing items in the appropriate âuniversalâ format. If desired, image 4068I may include cover sheets, virtual âstick onâ notes, and/or the like. Secure container 302 may contain any number of different 4054.
Container 302 may also contain another, data version 4068D of the item 4054. This data version 4068D might, for example, comprise one or more âword processingâ files corresponding to a text document, for example.
The container 302 may also contain one or more tools 4074 for using image 4068I and/or data 4068D. Tools 4074 might be used to allow the intended recipient 4056 to manipulate or view the image 4068I and/or the data 4068D. Tools 4074 might be computer programs in one example (as mentioned above, item 4054 can also be a computer program such as a program being sold to the recipient).
Secure container 302 may also contain an electronic, digital control structure 4078. This control structure 4078 (which could also be delivered independently in another container 302 different from the one carrying the image 40681 and/or the data 4068D) may contain important information controlling use of container 302. For example, controls 4078 may specify who can open container 302 and under what conditions the container can be opened. Controls 4078 might also specify who, if anyone, object 300 can be passed on to. As another example, controls 4078 might specify restrictions on how the image 40681 and/or data 4068D can be used (e.g., to allow the recipient to view but not change the image and/or data as one example). The detailed nature of control structure 4078 is described in connection, for example, with FIGS. 11D-11J ; FIG. 15 ; FIGS. 17-26B ; and FIGS. 41A-61 .
Secure container 302 may also include one or more routing slips 4072 and one or more audit trails 4077. Routing slip 4072 and audit trail 4076 are data structures defined by and/or associated with electronic controls 4078, and may be integrated as part of these electronic controls (see FIGS. 22-26B for example). Routing slip 4072 might be used to electronically route the object 300 to the intended recipient(s) 4056 and to specify other information associated with how the object 300 is to be delivered and/or handled. Audit trail records 4077 may be used to gather and recover all sorts of information about what has happened to object 300 and its contents (e.g., where container 302 has been, how image 40681 has been used, etc.). Audit trail 4077 may be used, for example, to generate a return receipt as shown in FIG. 92A . Routing slip 4072 and/or audit trail records 4077 (and associated controls 4078) don't have to be delivered within the same container 302 that contains the image 4068I and/or the data 4077âthey can be delivered independently in another container 302 if desired.
Document Signatures
FIG. 104 shows some examples of how system 4050 can âsignâ printed item 4054. In most modern societies, a person indicates his or her assent to a legal document by affixing his or her hand-written signature and/or seal. In the United States, for example, the act of hand writing one's signature on a document may legally bind the signer to the terms and conditions set forth in the document. In other countries (notably Japan), a person indicates assent and agreement to be legally bound by imprinting the document with a special stamp unique to that person. A corporation may emboss legal documents with its corporate seal to indicate the corporation's assent to the document contents. Governmental authorities in many countries use official seals to certify that the document is an official one.
System 4050 in this example can accommodate any or all of these conventions by imprinting various graphics and/or symbols on printed item 4054. In the FIG. 104 example, item 4054 bears a âhand-writtenâ signature 4300, a seal 4200, and a electronic fingerprint 4400 (that in one example may comprise a âhidden signatureâ).
Hand-written signature 4300 may be a graphical image of the signer's own hand-written signature. System 4050 can obtain this hand-written signature image 4300 in a number of ways. For example, system 4050 may require the signer to sign his or her signature at the time item 4054 is created. In this example, once the document is finalized, sender 4052 or contracting parts 4070 can sign his or her signature using a magnetic or pressure-sensitive signature capture device, for example. Such conventional signature capture devices electronically capture the image of a person's signature and store it in a memory. System 4050 can thenâonce it securely obtains the authorization of the signer with a very high degree of trustedness and sureness (e.g., by requesting a password, biometric test, etc.)âplace hand-written signature 4300 onto an appropriate part of item 4054.
Alternatively, the signer may carry his or her hand-written signature on a portable storage medium such as, for example, a magnetic, smart or memory card. The portable storage unit may employ rules and controls for budgeting the number of times and/or class and/or other circumstances of a transaction that a signature can be employed, or before the device needs to re-connect to a remote authority as disclosed in the above-referenced Shear et al. patent. The signer can present this storage medium to system 4050 as a source for the signature image 4300 shown in FIG. 104 . Once system runs certain checks to ensure that the signer is in fact the one who has presented the signature card, the system can securely read the signer's hand-written signature from the medium and place it on to item 4054.
In still another example, system 4050 may securely maintain hand-written signature files for a number of different users in a secure archive or âsecure directory servicesâ as disclosed in the above-referenced Shear et al. patent disclosure. At a user's request, system 4050 may call up the signature file pertaining to that user and impress the corresponding signature onto item 4054. If an image representation of a signature is stored on portable media or in a directory service, the image may be stored in an electronic container 302. Such a container 302 permits the owner of the signature to specify control information that governs how the signature image may be used. In addition, or alternatively, the signature image may be stored in or securely associated with a field of a digital certificate (that may, for example, also incorporate other identifying information).
FIG. 104 also shows a âelectronic fingerprintâ 4400. Electronic fingerprint 4400 may be used to indicate the signer's name and other information (such as, for example, the date and time of the transaction, the signer's public key, etc.) within the item 4054 contents in the way that makes it difficult to remove the information. A term derived from Greek roots, âsteganographyâ which means âhidden writingââapplies to such techniques that can be used to hide such information within a document while allowing it to be recovered later. Example techniques for hiding information from within text include, for example, varying the spacing between lines of text by an almost imperceptible amount to encode information (see FIG. 105A ), varying by very slight amounts the spacings (âkerningâ) between words or characters (see FIG. 105B ). System 4050 can use such âsteganographyâ techniques to hide information within an item 4054 (e.g., by slightly permuting the gray scale or color frequencies across a document) so it can be later recovered and used to authenticate and/or identify the documentâand/or it can use visible electronic fingerprinting or watermarking techniques to provide visible indications of such information (see FIG. 105C ).
System 4050 also is capable of imprinting special seals 4200 onto item 4054. FIGS. 106A-106C show example seals 4200. Seal 4200A shown in FIG. 106A may be the type of seal one expects from a Governmental document bearing an official seal. While it is possible for system 4050 to provide an embosser creating a raised seal 4200A, in a preferred embodiment system 4050 prints seals 4200A using a conventional monochrome or color printer at high resolution so that the seal image is flat. FIG. 106B shows an example rectangular seal 4200B in the center of the left margin of an item 4054, and another circular seal 4200C (for example, of the type that might be used in Japan) in the lower left hand corner of the document. FIG. 106C shows an item 4054 bearing two circular seals: one seal 4200D in the lower left hand corner of the page, and another circular seal 4200E in the lower right hand corner. FIGS. 106A-106C are merely illustrative examplesâany desired quantity, shape or configuration of seals or other visual, machine-readable codes can be used depending upon the prevailing legal climate, the country and aesthetic considerations.
FIGS. 107A and 107B show one example configuration for seal 4200. In this example, seal 4200 may include a center portion 4202, an outer portion 4204 and a border 4206. Center portion 4202 may bear a distinctive image to make the seal immediately recognizable. In this example, center portion 4202 is the great seal of the United Statesâand would thus be appropriate for affixing on U.S. Government official documents. Other appropriate images for seals might include, for example, a family coat of arms, a printed or holographic photograph image of the signer, a predetermined complicated pattern, or the like. Besides being distinctive, the image 4203 within center portion 4202 should preferable be complex and difficult to copyâmaking seal 4200 less prone to counterfeiting. Similarly, border 4206 may be an ornate pattern that might show discontinuities if printed or copied using inferior equipment.
In this example, outer portion 4204 is used for encoding digital information. FIG. 107A shows an example âtemplateâ seal before this additional encoding information is added. FIG. 107B shows an example of a completed seal in which many small lines have been added to at least portions of the outer ring 4204 of the seal 4200. Appliance 600 could âcompleteâ the FIG. 107A template seal to create a completed seal shown in FIG. 107B based on one or more electronic controls 4078. FIG. 107B also shows a close-up view illustrating that the line pattern can have variations that encode digital âbitsâ of information. In this particular example, lines 4208 radiating outwardly from center portion 4202 may encode a digital â1â value, while lines 4210 radiating inwardly from border 4206 may encode a digital â0â value. As another example, the selective use of large dots 4211 a, small dots 4211 b and no dots 4211 c could encode digital values. Any kind of information (e.g., numerical, text, graphics, sound, or any combination of these) may be encoded into the image of seal 4200 using this technique. The particular line images shown in FIG. 102B are illustrative onlyâother visual patterns (and/or steganographic techniques) may be used to encode digital information into the seal's image.
System 4050 can recover the encoded information by scanning and analyzing an image of item 4054 in either digital or printed form. In one embodiment, system 4050 can create electronic controls 4078 based at least in part on this information it obtains from seal 4200.
FIG. 108 shows one example of the type of âdigital signatureâ information that might be encoded into the seal 4200's image. In this particular example, the text and/or graphics contents of item 4054 can be transformed into a compact value using a special cryptographic function called a âone-way hashâ 4212. The resulting number may be âconcatenatedâ (i.e., put end to end) with other information such as, for example, a time value and a certificate value or number obtained from a âdigital certificateâ 4214. The time value may be obtained from a real time clock 528 incorporated in secure processing unit (SPU) 500 shown in FIG. 9 . The resulting string of digital information may then be encrypted with the private cryptographic key of sender 4052, the contracting party 4070 and/or system 4050. The resulting digital signature value 4216 may be used to encode some or all of the seal 4200's pattern.
The hash function may operate on a document in its image form, or its text equivalent (producing two different hash values). In addition, the text version of a document may be pre-processed before operation of the hash function to simplify verification of a document if it must be rekeyed into a verification system (e.g., in the case where all electronic copies of a document have been lost). Since cryptographically strong hash functions are extremely sensitive to the slightest change in data (yielding different values if, for example, a tab character is keyed as a series of spaces) this pre-processing may normalize the document by, for example, discarding all font and formatting information and//or reducing each occurrence of âwhitespaceâ (e.g., spaces, tabs, carriage returns, etc.) into a single space. If the same pre-processing is applied to a retyped version of the document before the hash function is applied, it will have a much higher likelihood of yielding the same hash value if the documents are substantively the same.
System 4050 may later recover this information by digitally and/or optically scanning the image of item 4054 and analyzing the pattern of seal 4200 to recover digital signature 4216. System 4050 may then apply the public key corresponding to the private key used to encrypt the informationâthereby recovering the hash, time and digital certificate, while at the same time authenticating the information as having been encrypted with the relevant private key(s). In this example, System 4050 also has the original document image 4054 available to it, and may therefore duplicate the one- way hash process 4212 and compare the hash value it gets with the hash value encoded within seal 4200. Mismatches indicate that the seal 4200 may have been copied from another document and does not apply to the document currently being analyzed.
Other types of digital identifying information that system 4050 might affix to the document include, for example:
FIG. 109 shows an example detailed architecture for electronic appliance 600. In this example, appliance 600 may include one or more processors 4126 providing or supporting one or more âprotected processing environmentsâ (PPE) 650 (e.g., SPEs 503 and/or HPEs 544) shown in FIGS. 6-12 and 62-72). Protected processing environment 650 may, for example, be implemented using a secure processing unit (SPU) 500 of the type shown in FIG. 9 and/or may be based on software tamper-resistance techniques or a combination of software and hardware. As described above in detail, protected processing environment 650 provides a secure, trusted environment for storing, manipulating, executing, modifying and otherwise processing secure information such as that provided in secure electronic containers 302. In this particular example, secure containers 302 may not be opened except within a protected processing environment 650. Protected processing environment 650 is provided with the cryptographic and other information it needs to open and manipulate secure containers 302, and is tamper resistant so that an attacker cannot easily obtain and use this necessary information.
Electronic appliance 600 may be any type of electronic device such as a personal computer, intelligent kiosk, set top box, or dedicated stand-alone communications applianceâjust to name a few examples. Processor 4126 is connected to
A document handler/ destroyer 4115 may be provided to feed multi-page documents into document reader/ scanner 4114 andâin one embodimentâto destroy documents to ensure that only one âoriginalâ exists at a time. Such controlled document destruction might, for example, be useful in allowing sender 4052 to deliver an original stock certificate to a transfer agent. The sender 4052 could insert the original certificate into appliance 600âwhich may scan the original to convert it to digital information (e.g., through use of OCR technology), confirm delivery, and then destroy the original paper version. Secure controls 4078 could be used to ensure that only a single original ever exists on paper.
Processor 4126 is also connected to secure and/or insecure digital or other storage 4130 (such as, for example, magnetic disks, random access memory, optical disks, etc.), and to a communications device 666 permitting the processor to communicate electronically with other processors or devices via an electronic network 4058 (672). In one example, appliance 600 may be provided with additional and/or different components such as shown in FIGS. 7 and 8.
Example Process to Send an Item
FIG. 110 shows example steps electronic appliance 600 may perform to send an item such as item 4054. Initially, electronic appliance 600 must be created or established at the user site (or the user must go to electronic appliance as shown in FIG. 88 ). This establishing process may include, for example:
Once the appliance 600 has been properly initialized, the first step in a send process 4500 may be to authenticate the identity of sender 4052 ( FIG. 110 , block 4502). This authentication step 4502 may be performed in a variety of ways such as, for example:
In this particular example, the authentication step 4502 may involve an application program executing on appliance 600 requesting authentication support from protected processing environment 650âfor example, sending to the protected processing environment an authentication âeventâ requesting the protected processing environment to authenticate the sender and providing authentication information to the protected processing environment ( FIG. 110 , block 4502) as a basis for the authentication.
FIG. 111 shows example steps that protected processing environment 650 may perform in response to receipt of an authentication event. The example steps shown in FIG. 111 are control set dependentâthat is, that are typically based on one or more electronic control sets previously delivered to the protected processing environment 650 during the registration process described above.
In-this particular example, the protected processing environment 650 may examine the authentication information provided to it (e.g., the output of biometric sensors, password information, information read from an identity card, etc.) and determine (based on methods provided in one or more electronic control sets) whether it has sufficient basis to conclude with a requisite, specified degree of assurance that the sender is who she says she is ( FIG. 111 , decision block 4502A). Processes identified within the control sets operating within the PPE 650 may perform these functions using resources provided by the PPEâproviding an important degree of programmable, general purpose behavior.
The nature and characteristics of this sender authentication test performed by PPE 650 may vary depending on the particular electronic control set being usedâas dictated by particular applications. As discussed above, in situations that have legal significance in which non-repudiation is very important, PPE 650 may impose a relatively stringent authentication test. Other, more routine situations may use control sets that impose less stringent authenticity checks.
The PPE 650 may abort the process if it decides there is insufficient information to form a trusted belief of authenticity and/or if it determines that the sender is not who she says she is ( FIG. 111 , block 4502B). PPE 650 may indicate/authorize that the process may continue if the authenticity check is successful ( FIG. 111 , âYâ exit to decision block 4502).
The sender's appliance 600 may next need to identify or âregisterâ the intended recipient(s) 4056 ( FIG. 110 , block 4506). In this particular example, the step of registering the intended recipient(s) involves generating a âregister recipientâ event and sending this event to protected processing environment 650. Upon receiving this âregister recipientâ event, protected processing environment 650 mayâbased on one or more methods within a corresponding electronic control set perform certain steps required to coordinate its activities with the intended recipient's electronic appliance 600âincluding, for example, contacting the intended recipient. Example steps are shown in FIG. 112 .
Why might the sender's PPE 650 need to contact the recipient before sending the item? The answer is that it may be necessary or desirable for the sender 4052 and the recipient 4056 to negotiate and/or agree as to the appropriate electronic controls that should apply. In an item transmission scenario, for example, such an âagreementâ might work out who is going to pay for the delivery service, which recipient appliance (home or office) the document is to be delivered to, what kind of return receipt is acceptable to both parties, etc.
The PPE 650's âregister recipientâ event processing may, for example, allow the proposed recipient to deliver a set of controls to the sender's system that defines the parameters of receipt. Some general purpose systems may use the default settings in the kiosk or other transmission station. The address itself may provide an indication to the transmitting station as to whether it may or must request a set of control information from the recipient prior to transmission.
More complicated scenarios may require further coordination. For example, an option to destroy the original item at the send end and recreate it at the recipient's end (e.g., in the case of the stock certificate mentioned earlier) is both a send option and a receipt option. Similarly, options pertaining to procedures for electronic contract execution typically will require pre-agreement from both the sender and the recipient (i.e., from all parties to the contract). In these cases, there should be some menu options that are driven by the address of the proposed recipientâand there may be an electronic (or humanly-driven) negotiation to resolve conflicts.
The PPE 650's âregister recipientâ processing may also require input or other interaction from the user. FIGS. 90A and 90B show a relatively straightforward menu-based user interface that may be used to elicit information from sender 4052. In a more advanced example, DTDs 1108 (see FIG. 23 and following) associated with one or more load modules 1100 may be used to control user interfaces (e.g., the âpop upâ as shown in FIGS. 72A-72D)). In this model, the user interface does not contain any specific visual elements (e.g., menus, buttons, data entry fields, etc.). Instead, the pop up contains application âframeworkâ code. The framework code in this style of user interface uses a structured input stream (DTD 1108) from the PPE 650 to create the visual elements of the interface, and optionally the allowed values of certain fields. This structured data stream may (like other control structure DTDs 1108) be based on SGML, for example.
This dynamic user interface approach allows control structures to be more âself describingâ in the sense that application programs do not need to know ahead of time (i.e. when they are written) all of the fields, values, etc. for the structures. This gives structure designers more freedom in how their controls are designed. Given a rich enough grammar in the DTD 1108, designers needn't concern themselves with whether application programs will have the ability to manage the interaction with a user regarding their structures. This capability can also be used to create controls that support the electronic negotiation process shown for example in FIGS. 76A-76B .
FIG. 112 shows example steps that may be performed by protected processing environment 650, based on one or more electronic control sets, in response to receipt of a âregister recipientâ event. In this example, PPE 650 first uses the dynamic user interaction discussed above to have the sender identify the proposed recipient(s) ( FIG. 112 , block 4503). For example, PPE 650 may request sender 4052 to provide various types of identification information corresponding to intended recipient(s) 4056 such as, for example, name; physical address; electronic address; public key; and the like. PPE 650 may check this user input for validity ( decision block 4503A), and may abort the process (or perform some other exception handling routine) if the input is not valid (e.g., it falls outside of the permissible scope as defined by associated electronic controls). PPE 650 may also, at this timeâwith or without input from sender 4052 as may be necessaryâidentify any other information required for identifying recipients, such as for example, any preset template(s), class identification requirements, and/or other automation factors and/or workflow assignments, redistribution, and/or content interaction parameters.
The PPE 650 then may determine whether it needs to request and obtain a control set from the recipient to proceed ( FIG. 112 , decision block 4506A). The PPE 650 may have obtained the required control set(s) during a previous transaction, the sender may supply the required control set, or the PPE may in some cases be able to use a âdefaultâ control set it already has so that no additional control set might be required (âNâ exit to decision block 4506A, FIG. 112 )âand send processing may proceed to the next step.
On the other hand, if PPE 650 must get a recipient's control set ( FIG. 112 , âYâ exit to decision block 4506A), the PPE 650 may contact the intended recipient's electronic appliance 600 and/or a control set archive ( FIG. 112 , block 4506B) over network 672 for example. PPE 650 may employ secure directory/name services as shown in FIG. 12 (and/or as described in the above-reference Shear et al. patent disclosure) to obtain sufficient information for sending and addressing the item to the intended recipient(s) 4056.
Once PPE 650 determines how to contact the recipient, it may construct an administrative object 870 (see FIG. 21 ) requesting the appropriate recipient controls ( FIG. 112 , block 4506C), and send the administrative object to the recipient's PPE 650 or other appropriate VDE node that can supply the information ( FIG. 112 , block 4506D).
The PPE 650 within the recipient's electronic appliance 600 or other responding VDE node may process administrative object 870 upon receiving it ( FIG. 112 block 4506E)âconstructing a response (e.g., a responsive administrative object containing the requested or require control sets) ( FIG. 112 block 4506G) and sending it to the sender's PPE 650.
The sender's PPE 650 may register the received controls ( FIG. 112 , block 4506H) upon receiving them from the recipient's PPE 650. The sender's PPE 650 may then determine, based on the received controls, whether it can continue ( FIG. 112 , decision block 4506I). If there is a problem with the controls (e.g., they are for some reason unacceptable to the sender, they are not valid, etc.), the sender's PPE 650 determines whether the problem is critical ( FIG. 112 , decision block 4506J). If the problem is critical, PPE 650 aborts the whole process (âYâ exit to FIG. 112 decision block 4506J).
If the problem is not critical (âNâ exit to FIG. 112 decision block 4506J), PPE 650 performs an exception process ( FIG. 112 , decision block 4506L) to handle the problem and then waits for the next eventâwhich in this particular example may be a âgenerate secure objectâ event (see FIG. 110 , block 4512). FIG. 113 shows example steps the PPE 650 may perform in response to this âcreate secure objectâ event based on the control sets registered in accordance with step 4506, for example.
Referring to FIG. 113 , the PPE 650 may use the dynamic user interaction techniques described above to request sender 4052 to select between send options and to otherwise specify the type and level of service he or she desires ( FIG. 113 block 4512A; see FIG. 91A block 4090A). Generally, sender 4052 may be required to select between various options; each option may carry with it a certain price. The following are example options the sender 4052 may select from:
Document Options
Delivery Options
Contract Execution Options
Teleconferencing Options
In the dynamic user interface model, for example, the user options associated with a contract offer (which are used to create electronic controls associated with the electronic transaction) might relate to a suggested addition, modification, deletion, etc. to an existing item 4054. If the VDE-aware applications used by the participants included word processing capabilities (given that the negotiation has a text based portion), for example, the VDE protected content in the offer could be represented as a âredlineâ or ârevision marking.â The controls could further include aspects that manage modification of content in a controlled way (e.g., see FIG. 51 , and FIGS. 51 a-f). A more complex example might include several of these modifications, insertions, deletions, etc. in a single offer to represent a âhorse tradingâ offer indicating a willingness to, make a series of changes at once, for example, a willingness to pay more money in exchange for removing a restrictive clause.
The options (and associated controls) associated with a contractual offer may also permit the offerer and/or the recipient to add comments to the offer before it is sent and/or accepted. These comments and/or some or all of the negotiation history may be recorded and managed using the audit capabilities of VDE and/or one or more repositories for VDE objects.
In this example, the PPE 650 checks the user input for validity ( FIG. 113 , decision block 4512B) based on applicable controls, and may abort the process (or provide other suitable exception handling) if the input is not valid.
PPE 650 may next specify any audit and routing controls based on the user input it has received and/or the recipient controls it has registered ( FIG. 113 , block 4512C). As mentioned above, object 300 may include one or more control sets 4073 (contained in one or more PERCs 306 for example) that specify the type of routing and auditing to be performed in connection with sending an item 4054 (and also providing one or more control methods for use in auditing and/or routing. Step 4512C typically also involve creating electronic controls specifying permissions and/or restrictions relating to the use of item 4054. In fact, the electronic control set(s) 4078 created by block 4512C may, for example, specify a variety of different document delivery or other characteristics such as, for example:
Control set 4078 can be used to enforce a secure chain of handling and control on document container 302 and/or its contents. This secure chain of handling and control may be used, for example, to specify delivery, routing, auditing or other parameters as discussed above.
In performing step 4512, appliance 600 may also create routing slip 4072 (see FIG. 103 ) and a template for return receipt(s) 4066. In one example, items 4066, 4072, may be embodied within electronic control set 4078 and expressed by the various elements within the electronic control set. FIG. 113A shows an example of a routing slip 4072 data structure that may be maintained within secure electronic container 302 (e.g., as one or more DTDs 1108 in connection with one or more load modules 1100âsee FIG. 23 ). This routing slip data structure 4072 may include, for example:
Exception list 4529 may indicate ânamed exceptionsâ (e.g., communications failure, line busy, refused receipt, refused payment request, etc.) paired with a list of responses (e.g., try again, cancel entire transaction, send report, invoke event in PPE) and data parameterizing the responses (e.g., number of retries, list of recipients of cancellation notices, report recipients, control information identifier and additional parameters for control use and/or invocation; respectively).
Recipient receipt information field 4527 for each recipient may indicate, for example, the nature of the receipt required, and the recipients of that receipt. A receipt âtemplateâ may be included in the container, may be referenced in an archive, or may be named out of a set of default templates stored in each appliance.
The routing slip 4072 (see FIG. 103 ) associated with the document(s) in the container may be integrated with control information 4078 reflecting chain of handling and control relationships among recipients. For example, the control information 4078 associated with the item(s) 4054 may be correlated with fields of the routing slip 4072. Successful completion of a receipt may qualify a specific user to become eligible to use a subset of the control information 4078 that permits them to make changes in a portion of the item, and describe their own control information for the changes, so long as this control information, does not provide further recipients with the right to modify the new material. The control information 4078 may further specify that no changes may be made to an item 4054 until one or more specified recipients has read the item, and (through use of reciprocal controls as show in FIGS. 41 a-41 d for example) indicated their approval of further changes.
In another example, an entire class of users may be permitted to access the documents (through the presence of a certificate indicating their membership in a class, for example), and the routing slip 4072 may be used to record who has handled a particular version of the document. Through use of chain of handling and control techniques, the presence of certain users on the routing slip may permit further control information to be specified by a user. For example, after an analyst's research report has been reviewed by three other analysts, a manager may be permitted to modify the control information associated with the report to permit transmission to âpublicâ users.
Electronic controls 4077 may also include one or more control methods specifying the type of audit information that is to be maintained in connection with the electronic transaction. This audit information may be used for constructing a receipt 4066, to provide evidence preventing repudiation, and for a variety of other functions. Such audit information may be maintained exclusively within the sender's appliance 600, it might be maintained exclusively within the recipient's appliance secure database, it might be maintained exclusively within the trusted go-between 4700's appliance 600 secure database, or it might be maintained in a combination of any or all of these. Additionally, the audit information may or may not be delivered with item 4054 depending on the particular objectives. A usage clearinghouse 200 c as described above in connection with FIG. 1A and/or as disclosed in the Shear et al. patent disclosure may be used to track the audit information based on event-driven or periodic reporting, for example. Audit records could be transmitted to a usage clearinghouse (or to a trusted go-between 4700) by an automatic call forwarding transmission, by a supplemental call during transmission, by period update of audit information, by the maintenance of a constant communication line or open network pathway, etc.
FIG. 113B shows an example of secure audit information 4077 that may be maintained under the control of one example set of electronic controls 4078. This audit information may include, for example:
As mentioned above, audit information 4077 associated with use of a document may be transmitted to many different parties. Audit information 4077 may also be treated as part of the signaling methodology described for reciprocal methods (see FIGS. 41 a-41 d) to provide receipts. For example, copies of receipts may be delivered to the sender, as described above, as well as to the sender's manager in a corporate setting, or to the sender's legal counsel or other professional advisors (such as tax advisers, accountants, physicians, etc.) Some items 4054 which are delivered to, or used by, recipients to gather information (such as tax forms, purchase orders, sales reports, and insurance claims) may require delivery of receipts to several parties other than the sender. Some transactions may require the delivery of such receipts before completion. For example, a sales report requesting delivery of products from a company's inventory may require that a receipt from the reading of a document delivered to the sales organization be received by the accounting department for audit purposes before permitting receipt of the document by the sales organization.
Referring once again to FIG. 113 , electronic appliance 600 may next request authority from sender 4052 to obtain payment for delivery of the item ( FIG. 110 , block 4505; FIG. 113 , block 4512D), Payment may be by any convenient mechanism, and may be made by the sender, the recipient and/or by a third party. This payment processing in this example is handled by PPE 650 in accordance, for example, with one or more billing methods as shown in FIG. 49D for example.
The appliance 600 is then ready to accept item 4054 (such as a document) to be sent if the item hasn't already been inputted ( FIG. 110 , block 4507; FIG. 113 block 4512E). PPE 650 may (based on control sets specifying this) use the dynamic user interaction technique described above to interact with the sender 4052 and obtain the requested item for transmission. As mentioned above, for physical documents, appliance 600 can optically scan the document into electronically readable form employing document reader/ scanner 4114 using page reader technology and/or optical character recognition, for example. For electronic documents or other items such as those created by a personal computer 4116 (see FIG. 95 ), this âinputtingâ step may be a matter of having sender 4054 select or create the item using standard document or file creation applications, or physically picking such document using icons or other menu-driven techniques. In one particular example, sender 4052 may âselectâ a document or item to send by commanding a word processing or other application to âprintâ or otherwise write the item to a particular virtual printer or other output device which is mapped into the overall secure electronic delivery process.
Appliance 600 may store the item in any of multiple representations. For example, it could store it in Adobe Acrobat (PDF) or other text based page description. Storing the document in CCIT Group III Facsimile format is an example of a âuniversalâ image format for black and white images. Group V is an example of a color format. TIFF is another example that incorporates many image types, as well as different compression formats and descriptive metadata.
PPE 650 may perform various tests on the inputted item and, or other results of the user interaction provided by block 4512E in accordance with one or more user controls. For example, if the sender has specified that he is sending a 6 page letter but only inputs five pages, PPE 650 may notice this discrepancy and notify the sender ( FIG. 113 , decision block 4512F). PPE 650 may abort the process or perform other suitable exception handling (âNâ exit to decision block 4512F) if the results of the test are not satisfactory.
PPE 650 may embed any seals 4200, signatures 4300 or hidden signatures 4400 into the item if needed ( FIG. 105 , block 4510). This process may involve, for example, identifying signature insertion locations and embedding signatures upon directed or other controlled circumstances. âIntelligentâ optical character recognition (OCR) may be used to identify signature locations. The display might also show an image of the page and allow the operator to identify the signature locations, for themselves, or more importantly, for other parties. The PDF (or other document description format) expressions could be extended to include a code that would allow indication of signature insertion points.
Depending upon the particular electronic controls being used, placement of the sender's signature or seal on the document may be based on the PPE 650's authentication of the sender as shown in FIG. 111 âand may require an additional indication of assent from the senderâfor example, pressing a âYesâ button, providing additional biometric or other identification information (e.g., âplace your finger on the sensor if you want to sign this letterâ or âProvide your mother's maiden name to sign this letterâ). Such authentication is important for non-repudiation and to prevent fraud. The sender might actually sign his signature on a pressure-sensitive or magnetic-sensing signature capture and/or verification pad, provide a bit-map image of his signature by presenting a âsmart cardâ storing it (plus using appropriate authentication techniques to assure that the bitmap image is being presented by the true signature owner), or provide enough information'through user interaction as described above that the PPE 650 can access an electronic signature file containing the signature (e.g., stored locally within appliance 600 or accessible over network 672 from an archive).
In the multi-party execution example shown in FIGS. 97 & 98 , appliance 600 could simultaneously embed two or more signatures into the same document or other item 4054âbut only upon securely receiving indications that all signatories assent to the document's terms.
Appliance 600 may next place the item and associated electronic controls into one or more secure containers 302 ( FIG. 113 , block 4512H). Referring to FIG. 103 once again, step 4512 normally involves placing the image 4068I of item 4054 (including any seats, signatures and other information) into the secure container 302. It may also involve placing a data (e.g., text) version of the item 4068D into the same or different container 302, along with possibly adding tools 4074 for using the item in either or both forms. The PPE 650 may then send the completed object 300 to an object switch 734 (see FIG. 12 ) for transmission to the recipient.
Referring to FIG. 110 , appliance 600 may then deliver the secure container(s) 302 to the intended recipient 4056 and/or to trusted electronic go-between 4700 based upon the instructions of sender 4052 as now reflected in the electronic controls 4078 associated with the object 300 ( FIG. 110 , block 4514). Such delivery is preferably by way of electronic network 4058 (672), but may be performed by any convenient electronic means such as, for example, Internet, Electronic Mail or Electronic Mail Attachment, WEB Page Direct, Telephone, floppy disks, bar codes in a fax transmission, filled ovals on a form delivered through physical mail, or any other electronic means to provide contact with the intended recipient(s).
Appliance 600 may, through further interaction with PPE 650, immediately and/or later provide a receipt such as shown in FIG. 89A ( FIG. 110 , block 4516). Appliance 600 can immediately issue a receipt indicating that the object 300 has been sent. If rapid electronic communications means are being used, appliance 600 may also receive audit trail information from the recipient's appliance 600 while the sender waits, and issue a receipt indicating some or all of the kind of recipient interaction information shown in the FIG. 92A example receipt. This receipt providing step may, for example, be based on PPE 650 receiving one or more administrative or other objects 300 containing audit information (see FIG. 113B ).
For purposes of security and trustedness, PPE 650 may actually âissueâ the receiptâalthough it may use various other portions of appliance 600 (e.g., receipt printer 4112A, display 4104, card/ media reader 4108, 4132, etc.) to output the receipt to the sender 4052. PPE 650 may also or alternatively maintain a copy of the receipt information (and/or the audit information 4077 on which it is based) within its secure database 610 (see FIG. 16 ). The trusted go-between 4700 similarly may maintain a copy of the receipt information (and/or the audit information 4077 on which it is based) within a secure electronic archive 4702.
Example Receive Process
FIGS. 114A and 114B show an example process 4600 for receiving an item. In this example, electronic appliance 600 that has received an electronic object 300 may first generate a notification to PPE 650 that the container has arrived ( FIG. 114A , block 4602). PPE 650 may, in response, use the dynamic user interaction techniques discussed above to interact with and authenticate the recipient in accordance with the electronic controls 4078 within the received object 300 ( FIG. 114A block 4603; authentication routine shown in FIG. 111 ).
Intended recipient 4056 may be given an option of accepting or declining delivery of the object ( FIG. 114A , block 4604). If intended recipient 4056 accepts the item, appliance may store the container 302 locally ( FIG. 114A , block 4606) and then generate a âregister objectâ event for processing by PPE 650.
FIG. 115 shows example steps that PPE 650 may perform in response to a âregister objectâ event. In this particular example, PPE 650 may generate and send any return receipt to sender 4052, trusted electronic go-between 4700, or other parties as required by the control set 4078 within container 302 ( FIG. 115 , block 4607A)âby for example recording audit records 4077 and transmitting them within an administrative object(s) 870 to the required appliances 600. Appliance 600 may next, if necessary, obtain and locally register any methods, controls or other information required to manipulate object 300 or its contents ( FIG. 115 , block 4607B; see registration method shown in FIGS. 43 a-d). For example, item 4054 may be delivered independently of an associated control set 4078, where the control set may only be partial, such that appliance 600 may require additional controls from permissioning agent 200 f (see FIG. 1A and ârights and permissions clearing houseâ description in the copending Shear et al. patent disclosure) or other archive in order to use the item.
PPE 650 may next securely authenticate the received item to ensure that it is not a counterfeit ( FIG. 115 , block 4607C). For example, appliance 600 may check one or more digital signatures 4076 within container 302 to ensure that they are authentic, or perform other authentication tests as described in detail above. PPE 650 may perform critical and/or non-critical exception processing (not shown) if the received object 300 and its contents are not authentic.
PPE 600 may analyze any seal or other secure information that is part of the item 4054. For example, although the item image may be captured and cropped by untrusted processes, the analysis of the image data is preferably done inside the PPE 650. Once the seal option of the image is identified, an analysis process will be run to recover the digital information stored in the seal (or steganographically encoded in the document). The next step is to determine what the expected values should be. To do this, the PPE 650 may make requests of an application program running locally to determine a user's expectations, may use a digital representation of a receipt or other audit data, and/or may contact a trusted go-between or other trusted third party to obtain the appropriate expected values. To facilitate this process, there may be some unencrypted information in the seal that can be used to establish a correlation with other information (e.g., a receipt, a transaction number, etc.). If such information is not available, a local store or a trusted third party might compare the entirety of the recovered digital information with stored records to determine such a correlation. In other cases, the expected values may be determined from context (e.g. a default set of expected values; or by examining the seal information itself, in either encrypted or decrypted form, for âtagsâ or other schema or semantic information).
Once the expectation values of the information is determined, any encrypted portion must be decrypted using the public key corresponding to the private key used above to make the seal. This key can be obtained using the mechanisms discussed in Ginter et al.
Once decrypted, the expected values may be compared with the actual values to determine correlation. Information about the correlation may be reported to a user and/or a third party, as appropriate. In addition, some or all of the seal information may be included in such report.
Once PPE 650 is satisfied that the received item is authentic, it may embed receipt related information into the item if the electronic controls 4078 associated with the item require it ( FIG. 115 , block 4607D). In one example, the âelectronic fingerprintingâ techniques described above in connection with FIGS. 58B and 58C may be used for encoding various types of information onto item 4054âfor example, to show where the document has been. PPE 650 may embed seals 4200 and/or hidden information 4400 onto the item image 4068I at this time if desired. Electronic fingerprinting, sealing and embedding hidden information may also be performed by the PPE 650 at the senders 4052 siteâbut, it may be advantageous to delay this process until the item arrives at the recipient's site because more things have happened to the item by then. For example, it may be desirable to encode, into seal 4200, hidden information 4400 and/or hidden or unhidden electronic fingerprinting and/or watermarking information, the time stamp of when the recipient actually opened the container 302. In some arrangements, one seal, hidden signature or hidden or unhidden electronic fingerprint could be added at the end of sender 4052, and an additional seal, piece of hidden information and/or hidden or visible electronic fingerprint could be added at the end of recipient 4056. Any or all of these various techniques may be used depending upon business requirements, convenience, logistics and aesthetics.
PPE 650 may next perform any required payment and/or other processing as needed ( FIG. 115 , block 4607E). For example, PPE 650 may charge the recipient 405.6 for receiving the document (e.g., âcollect on deliveryâ) or it may perform other processing such as debiting, crediting, initiating a local audit, round robin pass along, or the likeâall as specified for example by electronic controls 4078.
Referring again to FIG. 114A , appliance 600 may next index or otherwise catalog item 4054 for later access and reference ( FIG. 114A , block 4618), and may automatically identify document/file format for storage or presentation to recipient 4056 ( FIG. 114A , block 4620). Appliance 600 may then select any additional information necessary to allow the recipient 4056 to interact with the document (e.g., conduct any associated database searches or the like) ( FIG. 114B , block 4622), and then initiate any associated application(s) and any carrier application required to interact with the document/file ( FIG. 114B , block 4624). Appliance 600 may then generate a âsendâ or âopenâ event to PPE 650 requesting the PPE to open container 302 and allow the user to access its contents.
FIG. 116 shows example steps that may be performed by PPE 650 in response to an âopenâ or âviewâ event. In this example, PPE 650 mayâupon allowing recipient 4056 to actually interact with the item 4054âembed additional recipient interaction related information into the document such as, for example, the time the recipient actually looked at the document ( FIG. 115 , block 4625A). PPE 650 can at this time also send additional audit and or return receipt information to the sender 4052 indicating this event ( FIG. 116 , block 4625B) if the associated electronic controls 4078 require it. PPE 650 may then release the image 40681 and/or the data 4068D to the application running on electronic appliance 600âelectronic fingerprinting or watermarking the released content if appropriate ( FIG. 116 , block 4625C).
Referring again to FIG. 114B , appliance 600 may then wait for further instructions from the recipient 4056. If the recipient wishes (and is permitted by controls 4078) to print the item 4054 ( FIG. 114B , decision block 4628), appliance 600 may send a âprintâ event to PPE 650. FIG. 117 shows example steps PPE 650 may perform in response to such a âprintâ event. In this example, the PPE 650 may print the item using a suitable printer 4122, including (if necessary or desirable) a certifying seal 4200 and/or other markings on each page of the document ( FIG. 117 , block 4630A).
If recipient 4056 wants to redistribute the item to another person ( FIG. 114B , decision block 4632), appliance 600 may generate a âdistributeâ event to PPE 650. FIG. 118 shows example steps PPE 650 may perform in response to such as âdistributeâ event. If the electronic control set 4078 associated with the item 4054 permits redistribution, PPE 650 and appliance 600 may redistribute the item within a secure container(s) 302 based on the conditions set forth in the applicable control set. For example, the control set may specify that item 4054 is to be âelectronic fingerprintedâ to indicate that recipient 4056 has received and looked at it ( FIG. 118 , block 4634A). Other information that may be embedded into the document at this time could include, for example, information related to the retransmittal such as, for example, name of sender(s), name of recipient(s), location of sender(s), location of recipient(s), employer(s) of sender(s) and/or recipient(s), and/or any other identifying information. PPE 650 may then package all required information within the same or different electronic container 302 and release the completed object(s) 300 to appliance 600 for transport using electronic or other communications means ( FIG. 118 , block 4634B). PPE 650 may, if required by controls 4078, also send an administrative object 870 providing additional audit and/or receipt information to the sender 4052 indicating that the item has been passed on to the next intended recipient(s) ( FIG. 118 , block 4634C).
Example Trusted Electronic Go-Between Detailed Architecture and Operation
In addition to the secure archive, witnessing and transaction management functions discussed above, trusted electronic go-between 4700 may perform additional services, such as, for example:
The trusted electronic go-between 4700 may comprise or include a âtransaction authorityâ as disclosed in the above-referenced Shear et al. patent disclosure, and may have the same structure and architecture as shown in FIG. 55 et seq. of that co-pending application.
The trusted electronic go-between 4700 may be one computer or many. It may be centralized or distributed. It may be public or private. It may be self-sufficient, or it may operate in conjunction with other go-betweens or other support services. It may be entirely automatic, or it may include functions and tasks that must be performed using human skills and expertise. It could be owned by a corporation or other organization, or it could be a cooperative. It could charge for its services, or it might offer its services free of charge.
As illustrated in FIGS. 119-120B , the trusted go-between 4700 may use reciprocal methods and distributed processing (see FIG. 41 a and following) to perform its tasks. For example, the trusted go-between 4700 could actually be a group of organizations (e.g., a âtrusted go-betweenâ and a notary public) that each provide an aspect of the overall function. For example, a certifying authority, a governmental regulator, and an arbitrator could provide the trusted go-between function with the arbitrator acting as the âfront endâ (i.e. appearing as âtheâ trusted go-between from the participants' point of view). Alternatively, all three of these parties may each play a role as independent trusted go-betweens (with the cost of more complex control structures, and all three parties requiring some level of coordination by one or more of the other participants to the extent their functions relate to the same subject matter).
In another trusted go-between topology, each of the participants could have one or more trusted intermediaries that interact with each other on behalf of the participants.
FIG. 119 shows an example architecture for a trusted go-between 4700 that provides notarization functions. In this example, trusted go-between 4700 may include an electronic appliance 600 providing one or more protected processing environments 650 and a secure electronic archive 4072. In this example, electronic appliance 600 may include a server 4710 that communicates with protected processing environment 650 and supports one or more administrative applications 4712. Server 4710 may, in turn, communicate with additional electronic appliances 600B including associated protected processing environments 650B.
In this specific example, additional electronic appliance 600B may be owned and/or operated by an entity having the legal authority to be an electronic notary public. The notary public protected processing environment 650B may execute a control set 914B relating to notary functions. Control set 914B in this example, has a reciprocal relationship between an overall control set 914A executed by a protected processing environment 650A of electronic appliance 600A. As shown in FIG. 120A , a notary protected processing environment 650B may originate both parts of reciprocal control sets, and deliver one half 914A for operation by appliance 600Aâor electronic appliance 600A could originate both parts and deliver part 914B to the notary electronic appliance 600B.
The illustrated reciprocal control sets 914A, 914B may reciprocally interact as described above in connection with FIG. 41A-41D , for example. FIG. 120B shows example reciprocal methods 1000 that might be contained within an example pair of reciprocal control sets 914A, 914B. In this specific example, the control set 914B operated by the notary protected processing environment 650B may include, for example, the following methods 1000:
Similarly, the reciprocal control set 914A operated by electronic appliance protected processing environment 650A may include methods 1000 responding to reciprocal events, such as, for example:
The control sets 914B, 914A thus define and control the processing which go-between 4700 performs on documents and other items in order to notarize them. Human users may interact with this process if desired through optional user interfaces 4714, 4716. Such human intervention may be required under certain circumstances (for example, if a live human witness might be required to testify as to certain notarization facts, if the automatic processes determine that a fraud is being attempted, etc.). The dynamic interface technology described above can provide a mechanism for delivering a user interface through the system without direct intervention by the provider of the overall service with respect to user interface, and by the notary with respect to the customer relationship.
Example Trusted Go-Between Process Upon Item Receipt
FIG. 121 shows an example process 4750 that may be performed by a trusted electronic go-between 4700 in the FIG. 100 scenario shown above. In this example, the trusted electronic go-between 4700 receives notification that the electronic container 302 has arrived ( FIG. 121 , block 4752), may store the container locally ( FIG. 121 , block 4754), and opens and authenticates the container and its contents ( FIG. 121 , block 4756). The trusted electronic go-between 4700 may then, if necessary, obtain and locally register any method/rules required to interact with secure container 302 ( FIG. 121 , block 4758). The trusted electronic go-between automatically accesses and identifies any controls indicating processing options ( FIG. 121 , block 4759), and may generate any audit trails or other notification(s) that the container has arrived ( FIG. 121 , block 4760). The trusted electronic go-between 4700 may then optionally archive the electronic container (and/or transmission related data) locally ( FIG. 121 , block 4761)âaccording to specific options chosen by the sender or other participant and/or the default processing options of the trusted go-between (in one example, all containers and their contents may be stored for five years unless processing options were chosen to the contrary). The trusted electronic go-between 4700 may perform further processes as required by associated electronic controls ( FIG. 121 , block 4764). The trusted electronic go-between 4700 may, if necessary, redistribute the container to the next recipient ( FIG. 121 , block 4766), and may then notify the sender 4052 or other parties of the actions taken ( FIG. 121 , block 4766).
Trusted electronic go-between 4700 may also archive transmission related data as determined by the electronic control set 4078 associated with the item 4054 being sent, the transaction type and/or sender and/or recipient information ( FIG. 121 , block 4760). For example, trusted electronic go-between 4700 might automatically determine archiving requirements based at least in part on certified class based identification information regarding sender 4052 and/or recipient 4056. In one example, trusted electronic go-between 4700 archives transmittal related information such as receipt data structure 4066 in an object oriented database employing secure containers 302. It may also perform data reduction analysis and/or authentication processes ( FIG. 121 , block 4762) to provide client specific, class and/or transaction type usage analysis.
Trusted electronic go-between 4700 may next further process the received item 4054 in accordance with requirements provided by electronic control set 4078 ( FIG. 121 , block 4764). For example, the trusted electronic go-between 4700 might perform an integrity check on the item, or it may notarize the item before archiving it. Other processes that might be performed by trusted electronic go-between 4700, depending on the particular scenario, include for example the following non-exhaustive list of functions and/or operations:
As part of this processing, trusted electronic go-between 4700 may, if necessary, redistribute the electronic container 302 to the intended recipient 4056 ( FIG. 121 , block 4766).
Example Trusted Go-Between Process to Archive and Redistribute an Item
FIG. 122 shows an example process 4770 performed by trusted go-between 4700 to archive and redistribute an item 4054. In this example process 4770, the trusted go-between 4700 receives notification that an object 300 (e.g., a container 302 containing an item(s) 4054) has arrived ( FIG. 122 , block 4772). Trusted go-between 4700 may store the object 300 into its secure archive 4702 ( FIG. 122 , block 4774). It may then open the container 302 and authenticate its contents ( FIG. 122 block 4776). If necessary, trusted go-between 4700 may obtain and register any methods, rules and/or controls it needs to use or manipulate the object 300 and/or its contents ( FIG. 122 block 4778).
Unless it already has the required permission to redistribute the object 300 (e.g., based on controls within the object's container 302), trusted go-between 4700 may need to request permission to redistribute ( FIG. 122 , block 4780). Trusted go-between 4770 may test to determine whether it has the required permissions ( FIG. 122 , decision block 4782)âand request them from the appropriate party or parties if necessary.
If trusted go-between 4700 is unable to obtain the necessary additional permissions (ânoâ exit to decision block 4782, FIG. 122 ), the trusted go-between may send a failure notification ( FIG. 122 , block 4784) and may archive the requests, replies and audit records ( FIG. 122 , block 4786). If, on the other hand, trusted go-between 4700 has the necessary permission(s) to redistribute the received object 300 (âyesâ exit to decision block 4782, FIG. 122 ), the trusted go-between may affix one or more new seals 4200 to the item(s) 4068 ( FIG. 122 , block 4788), and may then send the sealed copies within secure containers 302 to the appropriate recipient(s) ( FIG. 122 , block 4790).
Trusted go-between 4700 may perform appropriate payment processing ( FIG. 122 , block 4792), and may optionally provide appropriate return receipts as required by the controls associated with the object 300 ( FIG. 122 , block 4794).
Example Process for Trusted Go-Between to Provide an Item from its Secure Archives
In most instances, retrieving archived data requires a user to authenticate themselves, and present information identifying the container. Some containers may require more than one party to retrieve data (e.g., both the recipient and the sender), in most cases a user who is not party to the transaction cannot retrieve data (an exception could be a government authority, such as a court or tax auditor). In one interesting case, all electronic copies have been lost or were never stored (presumably, the archive only contains transaction information and a hash value).
FIG. 123 shows an example process 4800 for trusted electronic go-between 4700 to provide items 4068 it has archived within secure archive 4702 to an appropriate authorized party (such as, for example, one of the owner(s) of the item or a court of law). In this example, trusted go-between 4700 may receive notification of the arrival of an object 300 requesting a particular item 4068 the trusted go-between previously archived within its secure archive 4702 ( FIG. 123 , block 4802). The trusted go-between 4700 may store the received object (block 4804, FIG. 123 ), and may open and authenticate the object ( FIG. 123 , block 4806). The trusted go-between 4700 may obtain and register any necessary controls it requires to fulfill the request ( FIG. 123 , block 4808).
In this example, the trusted go-between 4700 may authenticate the received request, and in the process may also satisfy itself that the requestor has authorization to make the request ( FIG. 123 , blocks 4810, 4812). This authentication process provides assurance that the request is authentic and has come from a party with authorization to obtain the requested information (for example, a court of competent jurisdiction).
Assuming the request and requestor are both authentic, trusted go-between 4700 may access the requested item(s) from its secure archive 4702( FIG. 123 , block 4814). Trusted go-between 4700 may affix one or more appropriated seals 4200 to the item(s) ( FIG. 123 , block 4816), and then send the sealed copy(s) of the item(s) to the requestor ( FIG. 123 , block 4818).
In this example, trusted go-between 4700 may optionally notify the owner(s) or other interested parties of item 4054 that it has provided a copy to the authorized requestor ( FIG. 123 , block 4820). Trusted go-between 4700 may perform appropriate payment processing as may be required for this transaction ( FIG. 123 , block 4822), and may optionally issue appropriate receipts to appropriate parties ( FIG. 123 , block 4824).
Example Contract Execution Process
FIGS. 124A-124B are together a flow chart of an example process for contract execution such as shown in FIG. 97 . In this example process 4830, Alice and Bob wish to enter into a contract. Alice creates the contract 4068 using a word processor or other appropriate mechanism ( FIG. 124A , block 4832). Alice identifies Bob as the other party to the contract ( FIG. 124A , block 4834). The protected processing environment 500 within. Alice's electronic appliance 600 may create appropriate electronic controls ( FIG. 124A , block 4836) specifying that Bob is the other party and other parameters (e.g., her offer is only good for thirty days, Bob's electronic appliance must use biometric sensing techniques of a certain type for execution, Bob may or may not change the contract) Alice may indicate to protected processing environment 500 within her electronic appliance 600 that she wishes to sign the contractâthereby creating a legal âofferâ ( FIG. 124A , block 4838). She may do so by, for example, clicking on a âI agreeâ icon or button her PPE 500 causes to be displayed, by placing her finger on a biometric sensor, etc. The particular mechanism used is preferably sufficiently secure to make it difficult for Alice to later repudiate her decision to sign. The strength of the authentication should be indicated in the transmission, as well as some requirement for this strength. This is central to âcommercial trustedness,â and furthermore the level of assurance (e.g. location, tamper resistance, etc.) is directly tied to this. The level of trustedness is based on the strength of authentication which can never exceed the strength of the assurance level; both of which should be disclosed to all relevant parties in a transaction.
In this response to this action, Alice's protected processing environment 500 may affix Alice's signature 4300 and/or appropriate personal seals 4200 to the contract (see FIG. 97 ) ( FIG. 124A , block 4838). The process 4830 may, at this point, perform an appropriate payment method pre-authorization (for example, to ensure that Alice will pay the compensation required under the contract) ( FIG. 124A , block 4840). Alice's protected processing environment 500 may package the sealed, signed contract 4068 with appropriate controls provided by block 4836 within an electronic container 302 ( FIG. 124A , block 4842). Alice's electronic appliance 600 may send the resulting object 300 to Bob's electronic appliance 600.
Upon receipt by Bob's electronic appliance ( FIG. 1224A , block 4844), Bob's protected processing environment 500 may open the container 302 and authenticate the received object 300, Alice's signature 4300 and/or her seal 4200 ( FIG. 124A , block 4846). Bob's protected processing environment 500 may then cause Alice's signed contract to be displayed so that Bob can read and understand it FIG. 124A , block 4848).
Assume that Bob reads the contract, and agrees to sign it ( FIG. 124A , block 4848). In this case, Bob's protected processing environment may send an object 300 to Alice's protected processing environment containing âagreementâ controlsâelectronic controls that provide PPE 500 with methods to perform when the parties have agreed to execute the contract ( FIG. 124A , block 4850)). At this point, Alice may confirm her intention to sign the contract as now agreed to by Bob (e.g., Bob may have modified the contract before agreeing to sign it) ( FIG. 124A , block 4852). This confirmation may, for example, be based on biometric or other non-repudiation assuring techniques as described above.
Alice's protected processing environment 500 may send notification of Alice's confirmation to Bob ( FIG. 124A , block 4854). Upon receipt of Alice's confirmation ( FIG. 124B , block 4856), Bob may also sign the contract conditional on Alice's signature ( FIG. 124B , block 4858). Bob's protected processing environment 500 may send the conditionally signed and sealed contract to Alice's protected processing environment ( FIG. 124B , block 4860). Alice may then sign and seal the contract ( FIG. 124B , block 4862) and her protected processing environment 500 may send the signed and sealed contract to Bobâretaining a copy for Alice herself ( FIG. 124B , block 4864)).
In this example, Alice's protected processing environment may also send a copy of the signed, sealed contract to a trusted go-between 4700 for notarization and/or archival purposes (see FIG. 101 ) ( FIG. 124B , block 4866). The trusted go-between 4700 may notarize and/or archive the signed, sealed contract ( FIG. 124B , block 4868), and may issue archival and/or notary receipts to both Alice and Bob ( FIG. 124B , block 4870).
In one specific example, the delivered contract can be a non-disclosure agreement co-delivered with an item(s) 4054 subject to the non-disclosure provisions of the agreement. Associated electronic controls automatically enforce the non-disclosure provisions of the agreement with respect to the co-delivered item(s) 4054.
Example Contract Execution Mediated By A Trusted Go-Between
FIGS. 125A-125B show an example contract execution process in which the trusted electronic go-between 4700 is more directly involve as an intermediary in forming the contract (see FIGS. 101, 101A , 101B). In this example routine 4872, steps 4832A-4840A may be similar or identical to steps 4832-4840 shown in FIG. 124A . However, instead of Alice sending the completed âofferâ object 300 directly to Bob's electronic appliance 600, Alice may send the object to trusted go-between 4700 ( FIG. 125A , block 4874).
Upon receiving the object ( FIG. 125A , block 4876), the trusted go-between 4700 may open the object and authenticate it ( FIG. 125A , block 4878). The trusted go-between 4700 may then apply its own seal 4200, and send its sealed, notarized copy of the offer in an electronic container 302 with associated appropriated electronic controls to Bob ( FIG. 125A , block 4880). Trusted go-between 4700 may notarize and archive the item and associated audit information so far created ( FIG. 125A , block 4882) (e.g., to keep a secure record of the negotiation process).
Upon receipt of the object, Bob's protected processing environment 500 may open the container 302 ( FIG. 125A , block 4884) and send audit records indicating receipt and opening of the object ( FIG. 125A , block 4886). Assuming that Bob agrees to sign the document (e.g., after he has read it) ( FIG. 125B , block 4848A), Bob may indicate his assent through biometric sensing or other techniques as described aboveâand his protected processing environment 500 may at that point send an object 300 with âagreementâ controls to the trusted go-between 4700 ( FIG. 125 , block 4888).
The trusted go-between 4700 may notify Alice of Bob's intention to sign the contract ( FIG. 125B , block 4890). Alice may then send the trusted go-between her signature with electronic controls making the signature conditional on Bob's signature ( FIG. 125B , block 4892). The trusted go-between 4700 may archive Alice's signature, and send Bob notification of Alice's conditional signature ( FIG. 125B , block 4894). Bob may the sign the contract conditional on Alice's signature ( FIG. 125B , block 4858A), and send the conditionally signed and sealed contract to the trusted go-between 4700 ( FIG. 125B , block 4896). The trusted go-between 4700 may apply Alice's signature and/or seal to the contract based on the controls she sent to the trusted go-between at block 4892 (FIG. 125B, block 4897). The trusted go-between 4700 may deliver the completed, signed and sealed contract to both Alice and Bob ( FIG. 125B , block 4898), and may optionally itself notarize and/or archive the signed, sealed contract ( FIG. 125B , block 4899).
Additional Examples
The following are some non-exhaustive examples of how system 4050 provided by the present inventions can be used in a variety of different, illustrative contexts.
ExampleâAutomobile Purchase
FIG. 126 shows an example of how trusted electronic go-between 4700 might help to coordinate and complete a complex contractual arrangement, such as the purchase of a car. Suppose buyers 4070A want to buy a car from manufacturer 4070B through car dealership 4070C. Buyers 4070A could use an electronic appliance 600 to specify the car model, options and price they are willing to pay. They could also fill out a credit application, provide a down payment, package all of this information into a secure electronic object 300A, and send the electronic container to trusted electronic go-between 4700. Trusted electronic go-between 4700 might then contact the car dealership 4070C, present the buyers' offer and receive (in another secure electronic object 300B) the car dealership's counter offer concerning price and availability. Trusted electronic go-between 4700 could negotiate or mediate between the two parties, and supervise the creation of a contract 68 finalizing the deal. Trusted electronic go-between 4700 could send a copy of the final contract 4068 to the buyers 4070A and to the car dealership 4070C, using secure electronic objects 300C and 300D to ensure secure electronic delivery of this information. Trusted electronic go-between 4700 could include the buyers' down payment within secure object 300D for receipt by car dealership 4070C. Trusted electronic go-between 4700 could also forward the buyers' credit application within yet another secure electronic object 300E to a credit company 4070D. The credit company could provide the proceeds of an automobile loan to car dealership 4070C to pay for the new car. Meanwhile, car dealership 4070C could send an order to the manufacturer 4070B who could manufacture and deliver the new car to the buyers 4070A either directly or through the car dealership 4070C.
Example Document Notary
FIG. 127 shows an example of how system 4050 could be used to notarize a contract, statement or other document. In this example, Bob (4070 a) and Ted (4070 b) may enter into a contract using electronic or other means. They may sign the contract electronically by having their electronic appliances 600, 600â² insert their handwritten and digital signatures (and if desired, also their own personal seals or other affirmations). They may then individually or jointly place the executed contract 4068 into one or more electronic containers 302(1) and transmit the contract to a trusted go-between 4700 for registration.
To prevent either party from later repudiating the contract 4068, trusted go-between 4700 may require certain secure indication(s) allowing the trusted go-between to verify that Bob and Ted are who they say they are. These indications required by trusted go-between 4700 should have sufficient reliability that they will later stand up in a court of law. One possibility is for trusted go-between 4700 to capture biometric information such as photographic images, fingerprints, handprints, retina patterns or the like. Another possibility is to rely on the digital signatures (and thus the security of the private keys) of Bob and Tedâpossibly in conjunction with digital certificates and biometric sensing techniques as described above. In system 4050, Bob's private key and Ted's private key might never be exposed outside of their respective secure electronic appliances 600, 600â²âpreventing each of them from voluntarily exposing their private keys as a basis for repudiating the contract.
Trusted go-between 4700 may be completely electronic and automatic. It may receive container 302(1), and open the container to access the contract 4068 it contains. Trusted go-between 4700 may create a notarial seal 4200 on the document encoded with information encrypted using the trusted go-between's private key. This encrypted information might indicate the time and date the trusted go-between received the document; a digital certificate number that securely identifies the trusted go-between; and the âhashâ value of the signed contract 4068 (see FIG. 103 above). Trusted go-between 4700 may include this resulting digital signature within its notarial seal 4200 and/or may place the digital signature elsewhere on the document 4068 to create a notarized version 4068â².
Trusted go-between 4700 may then store the notarized document 4068â² within its secure electronic archive 4702. The trusted go-between 4700 may also, if desired, supply copies of the notarized document back to Bob (4070 a) and Ted (4070 b) within additional electronic containers so they each have record copies of the notarized contract 4068â².
Suppose a dispute arises between Bob and Ted. Bob wants to enforce the contract 4068 against Ted. Ted claims he never signed the contract. Trusted go-between 4700 supplies a copy of the notarized contract 4068â² to a court of law 5016 or other dispute resolver. By electronically analyzing the executed contract 4068â², the court 5016 can read the notarization assurance of trusted go-between 4700 that Ted did in fact execute contract 4068. So long as the trusted go-between 4700 required sufficient verification of Ted's identity before electronically notarizing the document 4068â², the court 5016 should accept the notarization as conclusive evidence that Ted executed it.
Because of the extremely high degree of trustedness possible using system 4050, the FIG. 127 example could be used to communicate national security secrets or highly sensitive criminal investigation results (e.g., wiretaps) between authorized government agents. Trusted go-between 4700 might be authorized to register (but not open) the containers 302(1) it receives for later use as evidence in court 5016.
ExampleâTeleconferencing
FIG. 128 shows the variation on the FIG. 127 example including a teleconferencing capability. In this FIG. 128 above, intelligent kiosk appliances 600, 600â² are each equipped with a video camera 4124 that allows sender 4052 and recipient 4056 to see and speak with one another in real time. Sender 4052 can see recipient 4056 on the sender's display, and recipient 4056 can see sender 4052 on the recipient's display. Similarly, the sender and recipient can each hear each other through microphones/speakers 4128 (and/or telephone handsets 4110) their intelligent kiosks are equipped with.
This teleconferencing capability can be useful, for example, to allow sender 4052 and recipient 4056 to verify they each are who they say they are, and to assist in negotiating contract 4068 or otherwise discussing the content of an item 4054. In order to further assure the authenticity of the communication, a secure communications link may be established using key exchange techniques (e.g., Diffie-Hellman) and encryption of the signal between the stations.
Secure containers 302 may be used to encapsulate the video and audio being exchanged between electronic kiosk appliances 600, 600â² to maintain confidentiality and ensure a high degree of trustedness. Thus, in this example, each secure container 302(2) might contain some portion of or multiple video images and/or some portion of or multiple audio segments. Electronic appliances 600, 600â² can exchange such secure container 302(2) back and forth in rapid succession to provide real time audio and video transmission In order to improve performance, the containers themselves may remain at the users' sites, and only the encrypted contents transmitted between the participants. This may allow one or two containers to protect the entire communications between the parties.
In still another variation, the teleconferencing shown in FIG. 128 does not need to be simultaneous. For example, sender 4052 could walk up to kiosk appliance 600 and operate the kiosk to record a brief video and audio recording of a message. Sender 4052 could use appliance 600 to review and approve the recording, and then send the recording to recipient 4056 in more or more secure containers 302. Recipient 4056 could present himself to the same or different electronic appliance 600â² at a later time. The electronic appliance 600â² could verify that recipient 4056 is who he says he is, and then play back the senders recording.
ExampleâDoctor Management/Coordination of Health Records
FIG. 129 shows how system 4050 might be used to help a doctor 1000 manage and coordinate health records. In this example, after seeing a patient, doctor 5000 might use an electronic appliance 600 (such as a personal computer for example) to electronically create a patient record 5004 and a drug prescription 5006. The doctor 5000 could instruct electronic appliance 600 to package a copy of patient record 1004 and drug prescription 5006 into one or more secure electronic containers 302(1). Doctor 5000 could specify to electronic appliance 600 (in the form of electronic controls 4078) that:
The doctor 5000 may then send container 302(1) to a trusted go-between 4700. Trusted go-between 4700 could be a computer within a doctor's office, or it could be a commercially operated trusted go-between specializing in health care transactions or usable in general types of transactions. Trusted go-between 4700 might be instructed by electronic controls 4078 to time and date stamp electronic container 302(1) upon receipt, and to store the electronic container within its secure archive 4702. It might also be instructed to maintain patient records 5004 completely confidential (indeed, controls 4078 may prevent the trusted go-between 4700 from itself having any access to these patient records), but to forward a copy of the patient records 5004 to the patient's insurance company 5008 so the insurance company can pay for the medical services rendered by the doctor 5000. For example, the trusted go-between 4700 in one example has no access to the content of the container 302(1), but does have a record of a seal of the contents. If trusted go-between 4700 has the seal, it can interact with other parties to confirm the contents of the sealâwithout needing to know or disclosing (as the case may be) the contents. Controls 4078 might also instruct trusted go-between 4700 to forward the drug prescription 5006 to the patient's selected drug store 5010 upon the request of patient 5002.
The patient 5002 could make such a forwarding request, for example, by operating an intelligent kiosk 600â² at the drug store 5010. The patient's electronic request 5012 could be sent to trusted go-between 4700, which in response might retrieve the drug prescription 5006 from its secure archive and forward it electronically within a secure container 302(3) to the drug store 5010 chosen by patient 5002.
One of the patient records 5004 might be a consent form that was executed by patient 5002. To help prevent the patient 5002 from later repudiating his consent, doctor 5000 might register this consent form with trusted go-between 4700âwhich could then âwitnessâ it by notarizing it and affixing its seal, date stamp and/or digital signature. Trusted go-between 4700 could provide this consent form 5014 to a court of law 5016 and/or medical malpractice company in the event that patient 5002 sued the doctor for medical malpractice.
ExampleâComplex Business Transaction
FIG. 130 shows an example of how system 4050 might be used to accomplish a real estate transaction. In this example, seller 5030 wants to sell his house 5032, and buyer 5034 wants to buy the house. The seller 5030 and buyer 5034 and their respective real estate agents 5036, 5038 write a legal contract which the seller and buyer then sign. The seller 5030 and buyer 5034 use an electronic appliance 600 to create an electronic version of contract 4068 (or the electronic execution techniques discussed above could be used to initially create the contract). They place the executed electronic version of the contract 4068 within one or more secure electronic containers 302(1), and send the contract to trusted go-between 4700.
Trusted go-between 4700 registers the contract 4068, and then creates an electronic list of rules based on contract 4068. A partial example rule list is shown in FIG. 130A . Although the FIG. 130A conditions are shown as being written on a clipboard, in the preferred embodiment the âclipboardâ is electronically implemented by a computer and comprises one or more electronic control sets 4078 that specify the conditions that must be satisfied in order for the overall real estate transaction to settle.
Trusted go-between 4700 may need to communicate with each of a number of parties in order to determine whether the conditions have been satisfied. For example:
In this example, trusted go-between 4700 may receive electronic notifications in secure containers 302 as each step in the overall process is completed. As illustrated in FIG. A3A, trusted go-between 4700 can electronically check each completed condition off of its electronically-maintained condition list as it receives such event notifications. Trusted go-between 4700 maintains this electronic list 4704 in a secure, validated and authenticated manner using system 4050ârequiring, for example, receipt of electronic containers having event notifications that are signed cryptographically with one or more digital signatures from the appropriate parties. In this way, trusted go-between 4700 can maintain a highly reliable and validated, authenticated audit of the transaction steps as the overall transaction proceeds.
In addition, trusted go-between 4700 may, if desired, be empowered to issue additional requirements and/or instructions to facilitate the progress of the transaction. For example, trusted go-between 4700 might be a private trusted go-between operated by lender 5042âand thus, might be empowered to select which lawyer 5046 to use and to send that lawyer, automatically, appropriate instructions and forms for completing the transaction. As another example, the trusted go-between 4700 may be part of the business operated by lawyer 5046 or other settlement agent, and may thus be empowered to select and instruct escrow bank 5040.
When trusted go-between 4700 determines, based on the electronic rules/ control set 4704 and the notifications it has received that all conditions for settlement have been satisfied, the trusted go-between may allow the âatomic transactionâ to settle by issuing appropriate notifications and/or instructionsâonce again using secure electronic containers 302 and the receipt, verification, authentication, and other mechanisms discussed above to ensure reliability, confidentiality and a high degree of trustedness. For example:
All of these various coordination steps can be performed nearly simultaneously, efficiently, rapidly and with an extremely high degree of trustedness based on the user of electronic containers 302 and the secure communications, authentication, notarization and archiving techniques provided in accordance with the present inventions.
ExampleâCourt Filings and Docket Management
FIG. 131 shows how system 4050 could be used to manage filings in a court of law. In this example, the plaintiffs attorney 5050 and the defendant's attorney 5052 can electronically exchange court filings and other documents (e.g., letters, discovery requests, discovery responses, motions, briefs, responses, etc.) by sending secure containers 302 between their respective electronic appliances 600, 600â². Because of the high degree of security and trustedness provided by system 4050, even confidential information can be exchanged using this technique with little risk that the information will fall into the wrong hands (of course, the system cannot prevent people from making mistakes, in addition to the chanceâhowever remoteâthat a determined adversary could dedicate sufficient resources to cracking the system (such as, for example, through brute force techniques to âcrackâ the algorithms). The lawyers can specifically specify who can open the containers 302 and have a very high degree of trust that no one other than the specified individuals (e.g., opposing counsel and the court 5056) will be able to access the information within.
For example, defendant's attorney 5052 can specify one container 302 for opening by his co-counsel, client or client's in-house counsel, and program another container 302 for opening only by opposing (plaintiff's) counsel 5050. Because of the unique trustedness features provided by system 4050, the defendant's attorney 5052 can have a high degree of trust and confidence that only the authorized parties will be able to open the respective containers and access the information they contain.
Appliances 600, 600â² may issue highly trusted and reliable return receipts as described above. These highly trusted electronic return receipts may substitute for certificates of service if court 5016 permits.
The lawyers 5050, 5052 can also electronically file any of these exchanged documents with the court 5056 by sending the documents to the clerk 5054 via secure electronic containers 302. In this example, the clerk 5054 may actually be a computerized trusted go-between 4700 (represented here by a person but implemented in practice in whole or in part by one or more secure electronic appliances 600). The clerk 5054 may present a digital certificate evidencing that it is authorized to open a secure container 302 it has received. The clerk may then date stamp each received document (this may involve placing a seal 4200 on the document but more typically might involve simply placing a digital time signature on the document). The clerk 5054 may file the document electronically within a secure electronic archive 4702 that can provide a database for linking related documents together.
The judge 5056 might have a secure electronic appliance 600 in the courtroom or in chambers that could be used to view and/or print documents from the secure electronic archive 4702. The judge 5056 could instantly call up any filing to determine when it was received by, the clerk 5054 and to review its contents. Different authorizations and/or encryption strengths could be used with respect to publicly available documents and documents under seal (for example, so that sealed documents could only be opened by the judge 5056 or her staff).
The judge 5056 could write her orders and opinions using electronic appliance 600. She could then send these documents within a secure electronic container 302(3) for filing by the clerk 5054 in secure electronic archive 4702, and for automatic service on the lawyers 5050, 5052.
In this example, the clerk/trusted go-between 4700 could also be used to ensure compliance with the local rules of court. For example, the clerk/trusted go-between 4700 could maintain, in electronic form, electronic controls 4078 indicating the time and formal requirements with respect to different kinds of filings. The clerk/trusted go-between 4700 could automatically check all incoming filings from the lawyers 5050, 5052 to ensure compliance with the local rules, and to issue notices and other appropriate forms in accordance with the local rules. Use of a dynamic interface technology may be used to generate and deliver a set of controls to the sender's system that defines the parameters of receipt and default controls may be used to specify appropriate parameters, formats, etc.
FIG. 131 shows that this system can be extended to allow communications between defendant's counsel 5052, his co-counsel (e.g., defendant's in-house counsel) 5052A, and his client (e.g., the defendant's Chief Executive Officer) 5052B. Because of the high degree of trustedness and security provided by system 4050, there is no danger that privileged communications between defendant's CEO 5052B and defendant's litigating counsel 5052 will be disclosed to plaintiffs counsel 5050. On the other hand, defendant's litigating counsel 5052 could automatically distribute certain documents (e.g., court filings not under seal, discovery requests and responses, etc) to defendant's CEO 5052B and defendant's inside counsel 5052A in addition to sending them to the court 5016 and to plaintiff's counsel 5050. In this example, defendant's litigating counsel 5052 could enforce any/all of the following different electronic control set options on electronic container contents:
Note that in this example, documents can be controlled independently of where they are routed. For example, defendant's litigating counsel 5052 could specify electronic controls that would allow court 5016 to access a document that need not be filed with the court but which might be of interest to the court at a later date (e.g., letter between opposing counsel later used as an exhibit to a motion). The fact of document transmission (along with some information about the document such as document title and identifier) could be transmitted without actually transmitting the document itselfâallowing the court to retrieve the document itself independently at a later time if desired.
ExampleâPatent Office Automation
FIG. 132 shows how system 4050 might be used for Patent Office automation. In this example, an inventor 5060 might file her patent application 5062 by sending it to the Patent Office 5064 in one or more secure electronic containers 302(1). The high degree of trustedness, confidentiality and security provided in accordance with these inventions ensure that the patent application 5062 will arrive at the Patent Office 5064, and will not be disclosed to or accessed by anyone other than the Patent Office.
Upon receiving the patent application 5062, a trusted go-between 4700 within the Patent Office 5064 could open the container 302(1) and access the patent application 5062. Trusted go-between 4700 could electronically examine the patent application 5062 to ensure it meets all formal requirements, and could also date/time stamp the received patent application in order to document its filing date.
Trusted go-between 4700 could automatically issue the inventor 5060 a filing receipt based upon secure receipt of the patent application 5062 using the return receipt techniques described above. Trusted go-between 4700 could then deposit the patent application 5062 into a secure electronic archive 4702 to await examination. Trusted go-between 4700 could include appropriate routing information based on a routing slip as described above to route the patent application 5062 to the appropriate group and/or patent examiner 5064 within the Patent Office 5064.
A patent examiner 5064 could examine the patent application 5062 by requesting a copy of it from electronic archive 4702. All communications could take place within secure electronic containers 302(2) to ensure confidentiality and reliabilityâcompletely avoiding the problem of lost files. The patent examiner 5064 could conduct prior art searches using the same electronic appliance 600â² used to review the patent application 5062. The examiner 5064 could print out a copy of the patent application 5062 as desired.
The patent examiner 5064 could also use electronic appliance 600â² to draft office actions and notices. The examiner 5064 could communicate these notices and actions via trusted go-between 4700 to the inventor 5060. Trusted go-between 4700 could maintain copies of the examiner's actions and notices within secure electronic archive 4702âensuring their confidentiality and also making sure they do not become lost. System 4050 could provide a return receipt when the inventor 5060 opened the electronic container 302 containing the examiner's actions or noticesâthus proving in a highly reliable and trusted fashion that the inventor had in fact received what the examiner sent. Similarly, inventor 5060 could file responses (and could even teleconference with the examiner 5064) via electronic appliance 600. The high degree of trustedness and confidentiality provided by system 4050 along with the return receipt and other options discussed above provide a highly reliable, confidential communications means that can be used to demonstrate when items were actually filed.
Once the examiner after conducting a lengthy prior art search and carefully analyzing the patent application 5062 to ensure that the invention is patentableâis fully and completely satisfied that the inventor 5060 is entitled to a patent, the examiner 5064 could instruct the trusted go-between 4700 to grant the application as a patent. Trusted go-between 4700 could retrieve a copy of the application 5062 from the secure electronic archive 4702, use automatic means to transform it into an issued patent, and insert a seal 4200 (for example, bearing the digital certificate of the Patent Office 5064) onto the document. The trusted go-between 4700 could then issue the granted patent 5066 to the inventor 5060 by sending it in a secure electronic container 302(3)âthus ensuring that it does not get lost and is in fact received by the inventor.
Members of the public could obtain a copy of the issued patent 5066 by requesting one from trusted go-between 4700. Trusted go-between 4700 could maintain a copy of the issued patent 5066 within secure electronic archive 4702, along with electronic controls 4078 that specify the document is a matter of public record and can be disclosed to members of the public. Other documents in secure electronic archive 4702 (e.g., patent applications 5062 that have not yet been published) can be maintained confidential by use of electronic controls 4078 specifying that only certain people (e.g., patent examiner 5064) can access them.
The FIG. 132 example also provides a convenient mechanism for registering invention disclosure documents with the patent office or other organization. For example, inventor 5060 could use electronic appliance 600 to file an invention disclosure document with the trusted go-between 4700. Trusted go-between 4700 would notarize or witness receipt of the document upon receipt by embedding the document with a digital signature specifying the trusted go-between's identity, the current time and date, and a hash value for use in an integrity check. Trusted go-between 4700 could then file the invention disclosure document within secure electronic archive 4702. At a later date, inventor 5062 could prove the invention disclosure document had been created as of a certain date by requesting trusted go-between 4700 to produce a copy of the invention disclosure document from secure electronic archive 4702. Trusted go-between 4700 would thus provide a secure, trusted independent corroboration of document creationâsince it could demonstrate (based upon its imprinted digital signature) that it had received the document on a certain date and that the document had a certain contents.
The disclosure service could also simply send the inventor a signed hash value, and then discard the document; since the hash value could be used with a copy preserved by the inventor. The service could archive the signed hash value themselves as well (although that is not required).
ExampleâTax Filing System
FIG. 133 shows an example of how system 4050 can be used to facilitate filing of income or other taxes. Sender 4052 can use electronic kiosk appliance 600 to file her income tax return 5070. Appliance 600 transmits the income tax return 5070 to the governmental taxing authority 5072 within a secure container 302(1). Secure container 302(1) ensures that the tax return 5070 is opened by no one other than the governmental tax authority 5072. System 4050 can electronically provide a return receipt to sender 4052 proving that tax authority 5072 received the tax return 5070.
Appliance 600 may help the taxpayer 4052 complete her tax return 5070. For example, the appliance 600 could ask a series of questions based on a preprogrammed electronic script. The appliance 600 could calculate the taxes owed, andâonce taxpayer 4052 approved the tax return 5070âallow the taxpayer to electronically sign the return as described above. Appliance 600 could accept tax payments via credit or smart cards, debit authorizations from bank accounts, etc. Appliance 600 could also issue a paper or electronic receipt to the taxpayer 4052 assuring the taxpayer that the tax return 5070 has been filed. A court might accept this receipt as evidence of timely filing.
Tax authority 5072 may include an internal trusted go-between 4700 that registers and securely date stamps all tax return filings 5070 and places them into a secure electronic archive 4702. The trusted go-between 4700 can also analyze each tax return 5070 to ensure that it complies with electronic rules embodying the tax laws (some of this process could be performed by humans and some by computers if desired). Trusted go-between 4700 can provide, to a payment mechanism 5074, an electronic container 302(2) requesting the payment mechanism to issue a refund to (or collect a deficiency from) the tax payer 4052. In one example, payment can be in the form of electronic currency carried within one or more secure containers 302(3). If the return is structured appropriately for automated processing, tax calculations and application of relevant tax rules can also be automated by the trusted go-between.
ExampleâInter and Intra Organization Communications
FIG. 102 (described above) shows an example of secure trusted electronic go-betweens for use within and outside of organizations such as corporations. As described above, the secure electronic go-betweens 700(A), 700(B) can be used to facilitate secure item handling and delivery within an organization. As one example, suppose a confidential memo needs to be approved by users 600(A)(1), 600(A)(3) and 600(A)(5) (who can each revise the memo) before being distributed to each of users 600(A)(2), 600(A)(7)-600(A)(10) and 600(A)(12) (none of whom can change the memo), with copies to users 600(A)(1), 600(A)(3) and 600(A)(5) (who also can't change the memo after all three of them have signed off on it) and to no one else. Private trusted go-between 4700(A) can maintain a rule set that specifies these requirements. Trusted go-between 4700(A) can:
Organization A's Intranet 5104 might also be used to exchange and/or distribute highly confidential design specifications. System 4050 can provide a highly secure audit trail indicating who has had access to a container containing the confidential design specifications; when the person(s) accessed it; and what they did with the specification (print a copy, view it on screen for so many minutes, make a copy of it, etc.) System 4050 (with or without the assistance of a trusted go-between 4700(A) can also maintain, in digital form, a detailed record of who has âsigned offâ on the design specificationsâthus ensuring personal accountability and providing a high degree of efficiency.
Private transaction authorities 4700(A), 4700(B) can also provide a âfirewallâ function to protect confidential information from escaping to outside of the respective organizations A, B. Suppose for example that organization A is an integrated circuit design house and organization B is an integrated circuit foundry. Organization A designs and specifies the circuit layout of a chip, producing a âtape outâ that it sends to organization B. Organization B manufactures an integrated circuit based on the âtape outâ, and delivers chips to organization A.
System 4050 can be used to facilitate the above business transaction while protecting confidentiality within each of organizations A and B. For example:
Telecommunications are becoming ubiquitous in post-industrial societies. As a convenience to customers, the trusted go-between could offer many of its services as part of, or in conjunction with providers of telecom services. In one non-limiting example shown in FIG. 134 , a trusted go-between 4700 is co-located and integrated with a telephone switch that connects to a telephone or other telecommunications network via wires (or other connections) 5100 (in another example, the switch and trusted-go between 4700 cooperate, but are not co-located). In one example, a person with a laptop 5102 or other computer lacking a PPE 650 wishes nontheless to take advantage of a subset of secure item delivery services. The computer 5102 is equipped with a fax modem and associated application software. The computer dials a special number which may be an â800â number and is connected to the trusted go-between 4700 who authenticates the sender using a pre-established password and/or stronger methods such as biometric measurements. The sender indicates the telephone number of fax machine to receive the document.
After selection of delivery options and trusted go-between services, and after making arrangements for payment, the sender's computer 5102 faxes the document pages 4058 d, 4058 e, 4058 h to the trusted go-between 4700. In one example, the trusted go-between 4700 applies seals 4200 to each page 4058 d, 4058 e, 4058 f of the faxed document and an additional seal for the overall document. The trusted go-between 4700 then faxes the sealed document to the recipient fax machine 5104. The trusted go-between 4700 also archives and notarizes the sealed document in case the sender or other authorized party requires proof that the document was sent on a particular time and date to a device with a particular telephone number. In the event that the sender's and/or recipient's appliance is VDE aware (e.g., fax machine 4014 c equipped with a protected processing environment 650), this service will be provided with additional levels of security and trustedness.
In another example, the sender may prefer to have the document delivered in a secure container over a network such as the Internet, in which case, the sender may indicate the recipient's network address. The sender may connect a personal computer 5102 with a modem to another special number and send a digital item to the trusted go-between 4700 using Internet protocols. In this one example, the sender may not have yet installed VDE, and so the trusted go-between takes the document or item and puts it in a secure container along with controls selected by the sender and delivers the secure container to the recipient, who in this example, does have VDE installed.
These examples illustrate the more general point that the trusted go-between 4700 may provide a range of value-added services even to parties who do not yet have the VDE installed on their appliances, and can enhance the security and trustedness of item delivery nevertheless.
While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
8. A system as in claim 34 , said first apparatus further including: a secure database.
9. A system as in claim 8 , said first apparatus further including: a rights operating system.
10. A system as in
claim 9, said first apparatus further including:
one or both of node initialization hardware or node initialization software.
11. A system as in claim 34 , said first apparatus memory includes at least one rule associated with a group of users.
12. A system as in claim 34 , said first apparatus further including a card reader.
13. A system as in
claim 34, said first apparatus comprising
a kiosk, said kiosk further including:
a document reader;
a camera;
a microphone; and
a speaker.
14. A system as in claim 34 , said first apparatus comprising a television set-top box.
15. A system as in claim 34 , said first apparatus comprising a network electronic delivery server.
16. A system including:
a first apparatus including
user controls,
a communications port,
a processor,
a memory containing
a first rule, and
a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, said second rule at least in part governing the ability of a user of said first apparatus to transmit said audio file to a second apparatus;
one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses or for both transmission of secure container to other apparatuses and the receipt of secure containers from other apparatuses.
17. A system as in claim 16 , said first secure container having associated a third rule at least in part governing the ability of a user to alter at least a portion of the contents of said first secure container.
18. A system as in claim 16 , said first secure container having associated a third rule at least in part restricting the number of accesses and/or uses a user may make of at least a portion of the contents of said first secure container.
19. A system as in claim 16 , said first secure container having associated a third rule at least in part restricting the duration of at least some accesses, or uses, or both accesses and uses, of said audio file.
20. A system including:
a first apparatus including
user controls,
a communications port,
a processor,
a memory containing
a first rule;
a first secure container containing a file, the file including one or more of audio data, video data image data, or text date, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and
audit information;
one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses or for both transmission of secure container to other apparatuses and the receipt of secure containers from other apparatuses.
21. A system as in claim 20 , said audit information being stored in a second secure container.
23. A system as in claim 20 , said audit information including: information relating to identification of at least one recipient of at least a portion of the contents of said first secure container.
24. A system as in claim 23 , said first secure container having associated a third rule at least in part authorizing or allowing at least one action based at least in part on said audit information.
25. A system as in claim 24 , said at least one action including transmitting at least a portion of the contents of said first secure container to one or both of another apparatus or another user, said authorization of said transmission by said third rule being at least in part based on the identity of at least one prior recipient of said first secure container contents.
26. A system including:
a first apparatus including
user controls,
a communications part,
a processor,
a memory containing
a first rule; and
a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file, said first secure container having been received from a second apparatus and said second rule having been received from a third apparatus different from said second apparatus;
one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses or for both transmission of secure container to other apparatuses and the receipt of secure containers from other apparatuses.
28. A system as in claim 20 , said audit information including information regarding the manner in which one or both of said first secure container or contents of said first secure container has been used.
30. A system including:
a first apparatus including
user controls,
a communications port,
a processor,
a memory containing,
a first rule; and
a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file;
one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
user authentication hardware and/or software
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses or for both transmission of secure container to other apparatuses and the receipt of secure containers from other apparatuses.
31. A system as in claim 30 , said user authentication hardware and/or software including one or both of biometric authentication hardware or biometric authentication software.
32. A system as in claim 31 , said one or both of biometric authentication hardware or biometric authentication software including one or both of hardware or software which analyzes one or more of palm prints, signatures, voices, fingerprints, retinas, irises or faces.
33. A system as in claim 30 , said one or both of user authentication hardware or user authentication software further including at least one secure identity token.
34. A system including:
a first apparatus including
user controls,
a communications port,
a processor,
a memory containing
a first rule;
a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and
a digital certificate;
one ore both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses or for both transmission of secure container to other apparatuses and the receipt of secure containers from other apparatuses.
35. A system as in claim 34 , said digital certificate including information relating to the identification of at least one individual.
36. A system as in claim 34 , said digital certificate including information relating to the identification of at least one group.
37. A system as in claim 34 , said digital certificate including information relating to the identification of said first apparatus.
38. A system as in claim 34 , said digital certificate including biometric information related to the identification of at least one individual.
39. A system as in claim 34 , said digital certificate being stored in a second secure container, said second secure container being stored in said memory.
40. A system as in claim 39 , said memory storing one or more rules associated with said second secure container, said second secure container rules at least in part governing at least one aspect of access to or use of said digital certificate.
41. A system as in claim 34 , said digital certificate being stored in said first secure container.
US11/102,525 1995-02-13 2005-04-07 Trusted and secure techniques, systems and methods for item delivery and execution Abandoned US20050182956A1 (en) Priority Applications (2) Application Number Priority Date Filing Date Title US11/102,525 US20050182956A1 (en) 1995-02-13 2005-04-07 Trusted and secure techniques, systems and methods for item delivery and execution US11/981,634 US20080141033A1 (en) 1995-02-13 2007-10-30 Trusted and secure techniques, systems and methods for item delivery and execution Applications Claiming Priority (5) Application Number Priority Date Filing Date Title US38810795A 1995-02-13 1995-02-13 US69971196A 1996-08-12 1996-08-12 US09/221,479 US6185683B1 (en) 1995-02-13 1998-12-28 Trusted and secure techniques, systems and methods for item delivery and execution US09/632,944 US7143290B1 (en) 1995-02-13 2000-08-04 Trusted and secure techniques, systems and methods for item delivery and execution US11/102,525 US20050182956A1 (en) 1995-02-13 2005-04-07 Trusted and secure techniques, systems and methods for item delivery and execution Related Parent Applications (2) Application Number Title Priority Date Filing Date US09/221,479 Continuation US6185683B1 (en) 1995-02-13 1998-12-28 Trusted and secure techniques, systems and methods for item delivery and execution US09/632,944 Division US7143290B1 (en) 1995-02-13 2000-08-04 Trusted and secure techniques, systems and methods for item delivery and execution Related Child Applications (1) Application Number Title Priority Date Filing Date US11/981,634 Continuation US20080141033A1 (en) 1995-02-13 2007-10-30 Trusted and secure techniques, systems and methods for item delivery and execution Publications (1) Family ID=34841925 Family Applications (12) Application Number Title Priority Date Filing Date US09/632,944 Expired - Fee Related US7143290B1 (en) 1995-02-13 2000-08-04 Trusted and secure techniques, systems and methods for item delivery and execution US11/102,525 Abandoned US20050182956A1 (en) 1995-02-13 2005-04-07 Trusted and secure techniques, systems and methods for item delivery and execution US11/102,514 Expired - Fee Related US7281133B2 (en) 1995-02-13 2005-04-07 Trusted and secure techniques, systems and methods for item delivery and execution US11/102,216 Expired - Fee Related US7392395B2 (en) 1995-02-13 2005-04-07 Trusted and secure techniques, systems and methods for item delivery and execution US11/781,058 Abandoned US20080016361A1 (en) 1995-02-13 2007-07-20 Trusted and secure techniques for item delivery and execution US11/781,024 Abandoned US20080250241A1 (en) 1995-02-13 2007-07-20 Trusted and secure techniques, systems and methods for item delivery and execution US11/780,955 Expired - Fee Related US8528097B2 (en) 1995-02-13 2007-07-20 Trusted and secure techniques for item delivery and execution US11/829,553 Expired - Fee Related US7587369B2 (en) 1995-02-13 2007-07-27 Trusted and secure techniques, systems and methods for item delivery and execution US11/833,181 Abandoned US20070271463A1 (en) 1995-02-13 2007-08-02 Trusted and Secure Techniques for Item Delivery and Execution US11/926,863 Expired - Fee Related US8443198B2 (en) 1995-02-13 2007-10-29 Trusted and secure techniques for item delivery and execution US12/645,291 Abandoned US20100161963A1 (en) 1995-02-13 2009-12-22 Trusted and secure techniques for item delivery and execution US14/014,990 Expired - Fee Related US9195845B2 (en) 1995-02-13 2013-08-30 Trusted and secure techniques for item delivery and execution Family Applications Before (1) Application Number Title Priority Date Filing Date US09/632,944 Expired - Fee Related US7143290B1 (en) 1995-02-13 2000-08-04 Trusted and secure techniques, systems and methods for item delivery and execution Family Applications After (10) Application Number Title Priority Date Filing Date US11/102,514 Expired - Fee Related US7281133B2 (en) 1995-02-13 2005-04-07 Trusted and secure techniques, systems and methods for item delivery and execution US11/102,216 Expired - Fee Related US7392395B2 (en) 1995-02-13 2005-04-07 Trusted and secure techniques, systems and methods for item delivery and execution US11/781,058 Abandoned US20080016361A1 (en) 1995-02-13 2007-07-20 Trusted and secure techniques for item delivery and execution US11/781,024 Abandoned US20080250241A1 (en) 1995-02-13 2007-07-20 Trusted and secure techniques, systems and methods for item delivery and execution US11/780,955 Expired - Fee Related US8528097B2 (en) 1995-02-13 2007-07-20 Trusted and secure techniques for item delivery and execution US11/829,553 Expired - Fee Related US7587369B2 (en) 1995-02-13 2007-07-27 Trusted and secure techniques, systems and methods for item delivery and execution US11/833,181 Abandoned US20070271463A1 (en) 1995-02-13 2007-08-02 Trusted and Secure Techniques for Item Delivery and Execution US11/926,863 Expired - Fee Related US8443198B2 (en) 1995-02-13 2007-10-29 Trusted and secure techniques for item delivery and execution US12/645,291 Abandoned US20100161963A1 (en) 1995-02-13 2009-12-22 Trusted and secure techniques for item delivery and execution US14/014,990 Expired - Fee Related US9195845B2 (en) 1995-02-13 2013-08-30 Trusted and secure techniques for item delivery and execution Country Status (1) Cited By (47) * Cited by examiner, â Cited by third party Publication number Priority date Publication date Assignee Title US20070174902A1 (en) * 2006-01-24 2007-07-26 Hon Hai Precision Industry Co., Ltd. System and method for controlling an authorization procedure of a task US20080028474A1 (en) * 1999-07-29 2008-01-31 Intertrust Technologies Corp. Systems and Methods for Watermarking Software and Other Media US20080148348A1 (en) * 2003-09-26 2008-06-19 Ferguson John G Secure exchange of information in electronic design automation US20080209313A1 (en) * 2007-02-28 2008-08-28 Docusign, Inc. System and method for document tagging templates WO2008132248A1 (en) * 2007-04-26 2008-11-06 Logalty Servicios De Tercero De Confianza, S.L. Method and system for notarising electronic transactions US20090164335A1 (en) * 2000-02-04 2009-06-25 Swapalease, Inc Method, apparatus and program product for facilitating transfer of vehicle leases US20090222927A1 (en) * 2006-04-30 2009-09-03 Pikus Fedor G Concealment of Information in Electronic Design Automation US20090304164A1 (en) * 2006-06-09 2009-12-10 Yun Kyu Lee Control device for controlling secure fax machine and method thereof US20090319432A1 (en) * 2008-06-19 2009-12-24 Renfro Chadwick R Secure transaction personal computer US20100199107A1 (en) * 2003-09-26 2010-08-05 Ferguson John G Secure exchange of information in electronic design automation US20110107203A1 (en) * 2009-09-23 2011-05-05 Courtview Justice Solutions System and method for providing judicial orders US8051455B2 (en) 2007-12-12 2011-11-01 Backchannelmedia Inc. Systems and methods for providing a token registry and encoder US20110289423A1 (en) * 2010-05-24 2011-11-24 Samsung Electronics Co., Ltd. Method and apparatus for controlling objects of a user interface US20110314371A1 (en) * 2010-06-11 2011-12-22 Peterson Donald G Web-based electronically signed documents US8160064B2 (en) 2008-10-22 2012-04-17 Backchannelmedia Inc. Systems and methods for providing a network link between broadcast content and content located on a computer network US20130019095A1 (en) * 2011-07-14 2013-01-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Data services outsourcing verification US8447680B2 (en) * 2008-05-29 2013-05-21 Bank Of America Corporation Business transaction facilitation system US20130344916A1 (en) * 2009-06-10 2013-12-26 Digimarc Corporation Content sharing methods and systems US20140074722A1 (en) * 2012-09-12 2014-03-13 Microsoft Corporation Use of state objects in near field communication (nfc) transactions US20140343943A1 (en) * 2013-05-14 2014-11-20 Saudi Arabian Oil Company Systems, Computer Medium and Computer-Implemented Methods for Authenticating Users Using Voice Streams US8949706B2 (en) 2007-07-18 2015-02-03 Docusign, Inc. Systems and methods for distributed electronic signature documents US20150186812A1 (en) * 2013-12-31 2015-07-02 Corey MANDELL Agreement mediation method and apparatus US9094721B2 (en) 2008-10-22 2015-07-28 Rakuten, Inc. Systems and methods for providing a network link between broadcast content and content located on a computer network US9230130B2 (en) 2012-03-22 2016-01-05 Docusign, Inc. System and method for rules-based control of custody of electronic signature transactions US9251131B2 (en) 2010-05-04 2016-02-02 Docusign, Inc. Systems and methods for distributed electronic signature documents including version control US9268758B2 (en) 2011-07-14 2016-02-23 Docusign, Inc. Method for associating third party content with online document signing US20160300185A1 (en) * 2015-04-07 2016-10-13 Ebay Inc. Location detection devices for use in a courier services network US9628462B2 (en) 2011-07-14 2017-04-18 Docusign, Inc. Online signature identity and verification in community US9634975B2 (en) 2007-07-18 2017-04-25 Docusign, Inc. Systems and methods for distributed electronic signature documents US9679135B2 (en) 2008-06-19 2017-06-13 Bank Of America Corporation Computing device for secured transactions and virtual monitoring external from the operating system US9712868B2 (en) 2011-09-09 2017-07-18 Rakuten, Inc. Systems and methods for consumer control over interactive television exposure US9824031B1 (en) * 2016-10-28 2017-11-21 International Business Machines Corporation Efficient clearinghouse transactions with trusted and un-trusted entities US9824198B2 (en) 2011-07-14 2017-11-21 Docusign, Inc. System and method for identity and reputation score based on transaction history CN107645500A (en) * 2017-09-15 2018-01-30 æé½å¾·è¯æ°åç§æè¡ä»½æéå ¬å¸ Broadcast data exchange method and device US10033533B2 (en) 2011-08-25 2018-07-24 Docusign, Inc. Mobile solution for signing and retaining third-party documents US10147502B2 (en) * 2013-08-21 2018-12-04 Medtronic, Inc. Data driven schema for patient data exchange system US20190273618A1 (en) * 2018-03-05 2019-09-05 Roger G. Marshall FAKEOUT© Software System - An electronic apostille-based real time content authentication technique for text, audio and video transmissions US10511732B2 (en) 2011-08-25 2019-12-17 Docusign, Inc. Mobile solution for importing and signing third-party electronic signature documents EP3731483A1 (en) * 2019-04-27 2020-10-28 Unity Technology AG Method for generating digital signatures US10943030B2 (en) 2008-12-15 2021-03-09 Ibailbonding.Com Securable independent electronic document US20210110357A1 (en) * 2019-10-09 2021-04-15 Alclear, Llc Digital notarization intermediary system CN112911213A (en) * 2021-01-08 2021-06-04 广å·è®ä¸ä¿¡æ¯ç§ææéå ¬å¸ Monitoring system and monitoring method for parcel sorting stage US11080042B2 (en) 2014-11-06 2021-08-03 Intertrust Technologies Corporation Secure application distribution systems and methods US11201868B2 (en) * 2006-10-23 2021-12-14 Nokia Technologies Oy System and method for adjusting the behavior of an application based on the DRM status of the application US11282084B2 (en) * 2019-03-18 2022-03-22 Bolt Financial, Inc. Repurposing a transaction authorization channel to provide fraud notifications US20220217136A1 (en) * 2021-01-04 2022-07-07 Bank Of America Corporation Identity verification through multisystem cooperation US12248504B2 (en) 2023-05-31 2025-03-11 Docusign, Inc. Document container with candidate documents Families Citing this family (246) * Cited by examiner, â Cited by third party Publication number Priority date Publication date Assignee Title US6514461B1 (en) * 1997-02-14 2003-02-04 Escreen, Inc. System for automatically testing a fluid specimen FI19991847L (en) * 1999-08-31 2001-02-28 Nokia Networks Oy Utilization of subscriber data in the telecommunications system US7249259B1 (en) * 1999-09-07 2007-07-24 Certicom Corp. Hybrid signature scheme US6876991B1 (en) 1999-11-08 2005-04-05 Collaborative Decision Platforms, Llc. System, method and computer program product for a collaborative decision platform US9727916B1 (en) 1999-12-30 2017-08-08 Chicago Board Options Exchange, Incorporated Automated trading exchange system having integrated quote risk monitoring and integrated quote modification services US7356498B2 (en) * 1999-12-30 2008-04-08 Chicago Board Options Exchange, Incorporated Automated trading exchange system having integrated quote risk monitoring and integrated quote modification services US20080215474A1 (en) * 2000-01-19 2008-09-04 Innovation International Americas, Inc. Systems and methods for management of intangible assets US8504438B2 (en) * 2000-03-21 2013-08-06 James D. Bennett Online purchasing system supporting lenders with affordability screening US7191392B1 (en) * 2000-03-23 2007-03-13 Virpack.Com System and method for the creation of virtual information packages US7437310B1 (en) * 2000-03-27 2008-10-14 International Business Machines Corporation Third party contract depository for E-commerce transactions GB2368672A (en) * 2000-04-19 2002-05-08 Ford Global Tech Inc Online invention disclosure system US20050120217A1 (en) * 2000-06-05 2005-06-02 Reallegal, Llc Apparatus, System, and Method for Electronically Signing Electronic Transcripts US20040015385A1 (en) * 2000-08-31 2004-01-22 Takayasu Kumakawa Delivery reception aknowledging method and delivery reception acknowledging system US8010988B2 (en) 2000-09-14 2011-08-30 Cox Ingemar J Using features extracted from an audio and/or video work to obtain information about the work US8205237B2 (en) 2000-09-14 2012-06-19 Cox Ingemar J Identifying works, using a sub-linear time search, such as an approximate nearest neighbor search, for initiating a work-based action, such as an action on the internet US7415442B1 (en) * 2000-09-26 2008-08-19 Integrated Technological Systems, Inc. Integrated technology money transfer system US8527284B2 (en) 2000-09-29 2013-09-03 Escher Group Limited System for personal mail piece tracking and tracing from multiple sources by user identifier US20020083017A1 (en) * 2000-12-27 2002-06-27 Nokia Corporation Method and apparatus for providing improved management of a charging process over a network US7712029B2 (en) * 2001-01-05 2010-05-04 Microsoft Corporation Removing personal information when a save option is and is not available TWI238637B (en) * 2001-01-10 2005-08-21 Ibm Method and system for processing of documents with electronic signatures WO2002062009A1 (en) * 2001-01-30 2002-08-08 Digimarc Corporation Efficient interactive tv US7607018B2 (en) * 2001-05-08 2009-10-20 Ip.Com, Inc. Method and apparatus for collecting electronic signatures US7303120B2 (en) * 2001-07-10 2007-12-04 American Express Travel Related Services Company, Inc. System for biometric security using a FOB US20030033295A1 (en) * 2001-07-11 2003-02-13 Adler Marc Stephen Method for analyzing and recording innovations US20030050981A1 (en) * 2001-09-13 2003-03-13 International Business Machines Corporation Method, apparatus, and program to forward and verify multiple digital signatures in electronic mail WO2003038665A1 (en) * 2001-10-31 2003-05-08 Net-Release Pty Ltd A system and method of disseminating recorded audio information US7620583B2 (en) * 2001-11-30 2009-11-17 Worldpack, Inc. Method and apparatus for facilitating shipment of packages WO2003055222A2 (en) * 2001-12-21 2003-07-03 Koninklijke Philips Electronics N.V. Increasing integrity of watermarks using robust features US7937326B1 (en) * 2002-02-20 2011-05-03 The Standard Register Company Document security protection analysis assistant US20060089915A1 (en) * 2002-05-28 2006-04-27 Kantholy Suresh K Computer system for automating the controlled distribution of documents US7003131B2 (en) * 2002-07-09 2006-02-21 Kaleidescape, Inc. Watermarking and fingerprinting digital content using alternative blocks to embed information US8200438B2 (en) * 2002-08-19 2012-06-12 Escreen, Inc. Method and computer program for creating electronic custody and control forms for human assay test samples US7761501B1 (en) * 2002-10-24 2010-07-20 Cisco Technology, Inc. Methods and apparatus for providing data distribution that supports auditing DE60233762D1 (en) * 2002-10-28 2009-10-29 Nokia Corp KEY EQUIPMENT US6710194B1 (en) 2003-01-23 2004-03-23 Arco Chemical Technology, L.P. Epoxidation process AT501256A2 (en) * 2003-02-06 2006-07-15 Mobilkom Austria Ag & Co Kg SYSTEM FOR THE MANAGEMENT OF PRODUCTS AND PRODUCT PARTS OR ASSOCIATED SERIAL NUMBERS AND DATA PROCESSING SYSTEM US20100017627A1 (en) 2003-02-07 2010-01-21 Broadon Communications Corp. Ensuring authenticity in a closed content distribution system US8131649B2 (en) 2003-02-07 2012-03-06 Igware, Inc. Static-or-dynamic and limited-or-unlimited content rights US7526347B2 (en) * 2003-02-18 2009-04-28 Fisher-Rosemount Systems, Inc. Security for objects in a process plant configuration system US7991751B2 (en) * 2003-04-02 2011-08-02 Portauthority Technologies Inc. Method and a system for information identification KR20050118305A (en) * 2003-04-10 2005-12-16 ì½ëí´ë¦¬ì¼ íë¦½ì¤ ì¼ë í¸ë¡ëì¤ ì.ë¸ì´. Multimedia messaging method and system KR100432367B1 (en) * 2003-04-30 2004-05-20 í¸ë¥¸ì 보기ì (주) managing and control system for network and local printers JP4142982B2 (en) * 2003-05-13 2008-09-03 æ ªå¼ä¼ç¤¾ï¼°ï½ï½ Image reading device US7380209B2 (en) * 2003-09-02 2008-05-27 International Business Machines Corporation Managing electronic documents utilizing a digital seal JP4194500B2 (en) * 2004-01-30 2008-12-10 ãã¤ãã³æ ªå¼ä¼ç¤¾ Information processing apparatus, printing apparatus, print data generation method, and printing method US7770022B2 (en) * 2004-02-06 2010-08-03 Sharp Laboratories Of America, Inc. Systems and methods for securing an imaging job US20050203885A1 (en) * 2004-03-12 2005-09-15 U.S. Bank Corporation System and method for storing, creating, and organizing financial information electronically US7912777B2 (en) * 2004-03-12 2011-03-22 American Express Travel Related Services Company, Inc. System and method for using cash rebates US9219729B2 (en) 2004-05-19 2015-12-22 Philip Drope Multimedia network system with content importation, content exportation, and integrated content management CA2572249A1 (en) * 2004-06-28 2006-01-05 Genactis, Sarl Transmission of anonymous information through a communication network US20060031086A1 (en) * 2004-07-30 2006-02-09 Miles Michael D System and method for providing a virtual mailbox US20060026030A1 (en) * 2004-08-02 2006-02-02 Jack Jacobs System and method for matching users JPWO2006019016A1 (en) * 2004-08-18 2008-05-08 ã½ãã¼æ ªå¼ä¼ç¤¾ Backlight device and color liquid crystal display device US20060064375A1 (en) * 2004-09-20 2006-03-23 Pitney Bowes Incorporated Method and system for creating and maintaining records of title for items of property US20070226088A1 (en) * 2004-10-15 2007-09-27 Earth Class Mail Corporation Item management systems and associated methods US7584255B1 (en) 2004-11-15 2009-09-01 Bank Of America Corporation Method and apparatus for enabling authentication of e-mail messages US7996530B1 (en) * 2004-11-15 2011-08-09 Bank Of America Corporation Method and apparatus for enabling authentication of on-line communications US9076185B2 (en) * 2004-11-30 2015-07-07 Michael Dell Orfano System and method for managing electronic real estate registry information US8806218B2 (en) * 2005-03-18 2014-08-12 Microsoft Corporation Management and security of personal information US7783135B2 (en) * 2005-05-09 2010-08-24 Like.Com System and method for providing objectified image renderings using recognition information from images US7551300B2 (en) * 2005-06-17 2009-06-23 Pitney Bowes Inc. System and method for controlling the storage and destruction of documents EP2267706A3 (en) 2005-07-19 2012-03-14 Samsung Electronics Co., Ltd. Method and apparatus for efficiently fixing transformed part of content KR100648658B1 (en) * 2005-07-19 2006-11-24 ì¼ì±ì ì주ìíì¬ Electronic signature capable printing system, printer and printing method US20070083494A1 (en) * 2005-10-07 2007-04-12 Carlson Michael P Application of an electronic prescription object to food preparation EP1955471A4 (en) * 2005-12-01 2009-03-11 Firestar Software Inc SYSTEM AND METHOD FOR EXCHANGING INFORMATION BETWEEN EXCHANGE APPLICATIONS US10380568B1 (en) * 2005-12-20 2019-08-13 Emc Corporation Accessing rights-managed content from constrained connectivity devices US7996367B2 (en) * 2006-01-18 2011-08-09 Echosign, Inc. Automatic document exchange with document searching capability US7996439B2 (en) * 2006-01-18 2011-08-09 Echosign, Inc. Automatic document exchange and execution management US7895166B2 (en) * 2006-01-18 2011-02-22 Echosign, Inc. Automatic document exchange with archiving capability WO2007131132A2 (en) * 2006-05-03 2007-11-15 Voxant, Inc. System and method for collecting and distributing content US20070288645A1 (en) * 2006-06-08 2007-12-13 International Business Machines Corporation Method and System for Persistent and Reliable Data Transmission US7660596B1 (en) * 2006-06-30 2010-02-09 At&T Intellectual Property Ii, L.P. Method and apparatus for the ordering of carrier links US8869066B2 (en) 2006-07-06 2014-10-21 Addthis, Llc Generic content collection systems US8219817B2 (en) * 2006-07-11 2012-07-10 Dialogic Corporation System and method for authentication of transformed documents US8533477B2 (en) * 2006-07-11 2013-09-10 Dialogic Corporation Facsimile transmission authentication WO2008033840A2 (en) * 2006-09-12 2008-03-20 Eyespot Corporation System and methods for creating, collecting, and using metadata US20080127331A1 (en) * 2006-09-26 2008-05-29 Glenn Robert Seidman Method, system, and apparatus for linked personas authenticator US20080082627A1 (en) * 2006-09-29 2008-04-03 Allen Stewart O Method and Apparatus for Widget Container/Widget Tracking and Metadata Manipulation US8056092B2 (en) * 2006-09-29 2011-11-08 Clearspring Technologies, Inc. Method and apparatus for widget-container hosting and generation US8412947B2 (en) * 2006-10-05 2013-04-02 Ceelox Patents, LLC System and method of secure encryption for electronic data transfer US20080098214A1 (en) * 2006-10-24 2008-04-24 Antonio Rodriguez Martinez Encryption/decryption method, method for safe data transfer across a network, computer program products and computer readable media US8688992B2 (en) * 2006-11-02 2014-04-01 Recombo, Inc. System and method for generating agreements WO2008067336A2 (en) * 2006-11-27 2008-06-05 Earth Class Mail Corporation Sortation and extraction system for item management systems and associated methods WO2008064668A2 (en) * 2006-11-30 2008-06-05 Teles Ag Informationstechnologien Method for delivering primary information that exists in at least one electronic form WO2008109761A2 (en) * 2007-03-06 2008-09-12 Clearspring Technologies, Inc. Method and apparatus for data processing US9009728B2 (en) * 2007-03-06 2015-04-14 Addthis, Inc. Method and apparatus for widget and widget-container distribution control based on content rules US20080243661A1 (en) * 2007-03-30 2008-10-02 Bussone Ryan Joseph System and method of acquiring instant credit US20090043690A1 (en) * 2007-08-06 2009-02-12 Maclellan Paul System and method for validating indirect financing transactions US20100217988A1 (en) * 2007-04-12 2010-08-26 Avow Systems, Inc. Electronic document management and delivery US20090047928A1 (en) * 2007-07-03 2009-02-19 Utsch Thomas F Method and system for using message based security challenge and response questions for multi-factor authentication in mobile access to electronic information US20120036081A1 (en) * 2007-07-23 2012-02-09 Hatter Brenda F Method and system for a real-time interactive web/media-based electronic new or remote hire document processing system interfaced/interlink to an employer authorized distal/remote notaries public or 3rd party agent WO2009036435A1 (en) * 2007-09-14 2009-03-19 Auditude.Com, Inc. Restoring program information for clips of broadcast programs shared online US8209378B2 (en) 2007-10-04 2012-06-26 Clearspring Technologies, Inc. Methods and apparatus for widget sharing between content aggregation points US8063800B2 (en) * 2007-11-02 2011-11-22 Symbol Technologies, Inc. Efficient encoding and decoding of mixed data strings in RFID tags and other media US8626622B2 (en) * 2007-12-14 2014-01-07 Routeone Llc System and methods for electronic signature capture in e-contracting transactions US20090189971A1 (en) * 2008-01-30 2009-07-30 Michael Yoder Methods and apparatus for interactive automated receptionist US10003701B2 (en) 2008-01-30 2018-06-19 Xpedite Systems, Llc Systems and methods for generating and communicating enhanced portable document format files US8248237B2 (en) * 2008-04-02 2012-08-21 Yougetitback Limited System for mitigating the unauthorized use of a device US9286596B2 (en) * 2008-04-01 2016-03-15 Topaz Systems, Inc. Signing ceremony system and method US20090319424A1 (en) * 2008-06-20 2009-12-24 Bank Of America Postal mail deposit agency KR101007521B1 (en) * 2008-07-23 2011-01-18 (주)ìì¤ìíí¸ëì¦ Document authentication system and method using expert's digital signature US8352729B2 (en) * 2008-07-29 2013-01-08 International Business Machines Corporation Secure application routing US8600405B2 (en) 2008-08-12 2013-12-03 Apogee Technology Consultants, Llc Location-based recovery device and risk management system for portable computing devices and data US10679749B2 (en) * 2008-08-22 2020-06-09 International Business Machines Corporation System and method for virtual world biometric analytics through the use of a multimodal biometric analytic wallet US20100100626A1 (en) * 2008-09-15 2010-04-22 Allen Stewart O Methods and apparatus related to inter-widget interactions managed by a client-side master US8052060B2 (en) * 2008-09-25 2011-11-08 Utc Fire & Security Americas Corporation, Inc. Physical access control system with smartcard and methods of operating US7930447B2 (en) * 2008-10-17 2011-04-19 International Business Machines Corporation Listing windows of active applications of computing devices sharing a keyboard based upon requests for attention WO2010046864A1 (en) * 2008-10-22 2010-04-29 Virtual Documents (Pty) Ltd Document verification KR101305499B1 (en) * 2008-10-23 2013-09-05 ì¼ì±ì ì주ìíì¬ Image scanning apparatus and method RU2419154C2 (en) * 2008-11-06 2011-05-20 ÐаÑалÑÑ ÐеÑÑовна ÐаÑина Method and system to remotely identify and verify customer identity when rendering financial services US8341141B2 (en) * 2008-12-16 2012-12-25 Krislov Clinton A Method and system for automated document registration US8914351B2 (en) 2008-12-16 2014-12-16 Clinton A. Krislov Method and system for secure automated document registration from social media networks US8589372B2 (en) 2008-12-16 2013-11-19 Clinton A. Krislov Method and system for automated document registration with cloud computing CN102257540A (en) 2008-12-19 2011-11-23 Nxpè¡ä»½æéå ¬å¸ Enhanced smart card usage KR101224717B1 (en) * 2008-12-26 2013-01-21 ìì¤ì¼ì´íëë 주ìíì¬ Method for Protecting Software License, System, Server, Terminal And Computer-Readable Recording Medium with Program therefor US20100164685A1 (en) * 2008-12-31 2010-07-01 Trevor Pering Method and apparatus for establishing device connections US10204704B1 (en) 2009-02-03 2019-02-12 Brooke Erin Wurst Systems and methods for biometrically retrieving medical information US9501618B1 (en) 2009-02-03 2016-11-22 Brooke Erin Wurst Systems, methods and devices for anonymously collecting personal data using a mobile device EP2226966A1 (en) * 2009-03-03 2010-09-08 Gemalto SA Method for securely establishing a virtual multi-party contract which can be materialised US8260720B1 (en) * 2009-03-25 2012-09-04 United Services Automobile Association Systems and methods for emergency duress security code and related instructions US20110019240A1 (en) * 2009-07-21 2011-01-27 Harris Technology, Llc Digital control and processing of transferred Information US9122729B2 (en) * 2009-07-31 2015-09-01 Cumulus Data Llc Chain-of-custody for archived data US8204861B2 (en) * 2009-08-07 2012-06-19 Oracle International Corporation Event driven audit logging US20110066851A1 (en) 2009-09-14 2011-03-17 International Business Machines Corporation Secure Route Discovery Node and Policing Mechanism US20120005099A1 (en) * 2009-09-14 2012-01-05 Intelli-Services, Inc. Secure Electronic Records in Smart Devices KR101129318B1 (en) * 2009-10-08 2012-03-26 ìµì´í¸ Method and system providing lending service using biometrics card US8447699B2 (en) * 2009-10-13 2013-05-21 Qualcomm Incorporated Global secure service provider directory US20110119158A1 (en) * 2009-11-17 2011-05-19 Garry Gladstone System for increasing efficiencies in distribution of pre-owned vehicles US9106603B2 (en) * 2009-12-23 2015-08-11 Synchronics plc Apparatus, method and computer-readable storage mediums for determining application protocol elements as different types of lawful interception content US20110164138A1 (en) * 2010-01-04 2011-07-07 Toussaint Taliaferro Tyson Process for the Automatic Conversion of Film Images into Programmable OOP Objects for Movie WO2011081589A1 (en) * 2010-01-04 2011-07-07 Dts Steering Group Ab Secure digital communications US10826885B2 (en) * 2010-03-02 2020-11-03 Liberty Plugins, Inc. Digital certificate and reservation US20110238980A1 (en) 2010-03-23 2011-09-29 Fujitsu Limited System and methods for remote maintenance in an electronic network with multiple clients US9286485B2 (en) * 2010-03-23 2016-03-15 Fujitsu Limited Using trust points to provide services US20110270761A1 (en) * 2010-04-30 2011-11-03 Tobsc Inc. Methods and apparatus for a financial document clearinghouse and secure delivery network US8694332B2 (en) * 2010-08-31 2014-04-08 Xerox Corporation System and method for processing a prescription US9396464B2 (en) * 2010-09-14 2016-07-19 Ncr Corporation Updating multi-media content in a digital download kiosk US20120072320A1 (en) * 2010-09-22 2012-03-22 William Kowalski Tax-return assembly, apparatus, and method KR101657615B1 (en) * 2011-01-28 2016-09-21 ë¡ìí° í¨ì´ì¤ íë©ì¤ ì½í¬ë ì´ì Electronic transaction risk management US20120203798A1 (en) * 2011-02-09 2012-08-09 Lori Gifford Secure medical record information system US20120254001A1 (en) * 2011-03-28 2012-10-04 Ran Alexander S Method and system for providing an agreement witness service US8572134B2 (en) 2011-06-20 2013-10-29 Bank Of America Corporation Transforming and storing messages in a database US8805795B2 (en) 2011-06-20 2014-08-12 Bank Of America Corporation Identifying duplicate messages in a database US9858401B2 (en) * 2011-08-09 2018-01-02 Biogy, Inc. Securing transactions against cyberattacks US9135656B2 (en) 2011-08-24 2015-09-15 Strategic Acquisitions, Inc. Method and system for auction information management AU2012302021B2 (en) * 2011-08-29 2016-05-19 Aibuy, Inc. Containerized software for virally copying from one endpoint to another US9294283B2 (en) * 2011-08-31 2016-03-22 Q-Tag Ag Methods and devices for monitoring the integrity of an article during transporting said article US10108928B2 (en) 2011-10-18 2018-10-23 Dotloop, Llc Systems, methods and apparatus for form building US9043866B2 (en) * 2011-11-14 2015-05-26 Wave Systems Corp. Security systems and methods for encoding and decoding digital content US9015857B2 (en) * 2011-11-14 2015-04-21 Wave Systems Corp. Security systems and methods for encoding and decoding digital content US9141959B2 (en) 2011-11-29 2015-09-22 Autography Llc Method and system for replaying a voice message and displaying a signed digital photograph contemporaneously US9558416B2 (en) 2011-11-29 2017-01-31 Autography, Llc Method and system for replaying a voice message and displaying a signed digital photograph contemporaneously US10340034B2 (en) 2011-12-30 2019-07-02 Elwha Llc Evidence-based healthcare information management protocols US10559380B2 (en) 2011-12-30 2020-02-11 Elwha Llc Evidence-based healthcare information management protocols US10475142B2 (en) 2011-12-30 2019-11-12 Elwha Llc Evidence-based healthcare information management protocols US10402927B2 (en) 2011-12-30 2019-09-03 Elwha Llc Evidence-based healthcare information management protocols US10528913B2 (en) 2011-12-30 2020-01-07 Elwha Llc Evidence-based healthcare information management protocols US10552581B2 (en) 2011-12-30 2020-02-04 Elwha Llc Evidence-based healthcare information management protocols US10679309B2 (en) 2011-12-30 2020-06-09 Elwha Llc Evidence-based healthcare information management protocols US8989376B2 (en) * 2012-03-29 2015-03-24 Alcatel Lucent Method and apparatus for authenticating video content US8966256B2 (en) 2012-04-30 2015-02-24 Hewlett-Packard Development Company, L.P. Transmitting a document US20140025233A1 (en) 2012-07-17 2014-01-23 Elwha Llc Unmanned device utilization methods and systems US9254363B2 (en) 2012-07-17 2016-02-09 Elwha Llc Unmanned device interaction methods and systems US9544284B1 (en) * 2012-07-27 2017-01-10 Daniel A Dooley Secure data exchange technique US10826951B2 (en) 2013-02-11 2020-11-03 Dotloop, Llc Electronic content sharing US9019092B1 (en) 2013-03-08 2015-04-28 Allstate Insurance Company Determining whether a vehicle is parked for automated accident detection, fault attribution, and claims processing US10032226B1 (en) 2013-03-08 2018-07-24 Allstate Insurance Company Automatic exchange of information in response to a collision event US10963966B1 (en) 2013-09-27 2021-03-30 Allstate Insurance Company Electronic exchange of insurance information US8799034B1 (en) 2013-03-08 2014-08-05 Allstate University Company Automated accident detection, fault attribution, and claims processing GB2526212A (en) * 2013-03-15 2015-11-18 Auction Com Llc Managing workflow for closing a real property asset transaction US10212144B2 (en) 2013-03-15 2019-02-19 Assa Abloy Ab Digital credential with embedded authentication instructions US10109007B2 (en) 2013-03-15 2018-10-23 Ten-X, LLC. Providing information of assets for transaction to a user based on the user profile US8959595B2 (en) 2013-03-15 2015-02-17 Bullaproof, Inc. Methods and systems for providing secure transactions EP2972945A4 (en) 2013-03-15 2016-08-17 Broadridge Fluent Solutions Llc COMMUNICATION EXCHANGES AND METHODS OF USE US20140289008A1 (en) 2013-03-15 2014-09-25 Auction.Com, Llc Seller interface for displaying status of auctions using predictive information US9582789B2 (en) * 2013-03-15 2017-02-28 Google Inc. Payments in communication systems US9575622B1 (en) 2013-04-02 2017-02-21 Dotloop, Llc Systems and methods for electronic signature WO2015003088A1 (en) * 2013-07-02 2015-01-08 Sony Corporation Content-bound trusted executables US10572943B1 (en) * 2013-09-10 2020-02-25 Allstate Insurance Company Maintaining current insurance information at a mobile device US9443270B1 (en) 2013-09-17 2016-09-13 Allstate Insurance Company Obtaining insurance information in response to optical input CN105580008B (en) * 2013-10-30 2019-03-26 éºç§è¾¾ Transaction voucher operation and management system US10552525B1 (en) 2014-02-12 2020-02-04 Dotloop, Llc Systems, methods and apparatuses for automated form templating EP3140979A4 (en) * 2014-05-09 2017-12-27 Veritaseum Inc. Devices, systems, and methods for facilitating low trust and zero trust value transfers US9929995B2 (en) * 2014-05-21 2018-03-27 Go Daddy Operating Company, LLC Third party messaging system for monitoring and managing domain names and websites US10623468B1 (en) * 2014-05-30 2020-04-14 Mbr Innovations Llc Systems and methods for simultaneous electronic file exchange US10838378B2 (en) * 2014-06-02 2020-11-17 Rovio Entertainment Ltd Control of a computer program using media content US10552827B2 (en) * 2014-09-02 2020-02-04 Google Llc Dynamic digital certificate updating US10733364B1 (en) 2014-09-02 2020-08-04 Dotloop, Llc Simplified form interface system and method US9424576B2 (en) * 2014-09-15 2016-08-23 Xerox Corporation Methods and systems of creating a payment record with a cryptographically secure audit trail CN105730950B (en) 2014-12-10 2019-06-21 é¿éå·´å·´é墿§è¡æéå ¬å¸ A kind of Intelligent cargo cabinet and the delivery system based on Intelligent cargo cabinet US10083470B2 (en) 2014-12-16 2018-09-25 Autography Llc Systems and methods for personalizing digital fantasy sports memorabilia CN104573459B (en) * 2015-01-12 2018-02-02 å京æºè°·ç¿æææ¯æå¡æéå ¬å¸ Exchange method, interactive device and user equipment US10713717B1 (en) 2015-01-22 2020-07-14 Allstate Insurance Company Total loss evaluation and handling system and method US9654294B2 (en) 2015-02-26 2017-05-16 Red Hat, Inc. Non-repudiable atomic commit US10699001B2 (en) * 2015-03-31 2020-06-30 Paradigm, Inc. Systems and methods for generating and validating certified electronic credentials US20160300223A1 (en) * 2015-04-08 2016-10-13 Portable Data Corporation Protected data transfer across disparate networks BR112018001151A2 (en) * 2015-07-20 2018-09-18 Notarize Inc system and method for validating authorship of an electronic signature section US10796389B2 (en) 2016-02-09 2020-10-06 Mikko Vaananen Legal document filing system US10033536B2 (en) 2016-03-25 2018-07-24 Credly, Inc. Generation, management, and tracking of digital credentials US10068074B2 (en) 2016-03-25 2018-09-04 Credly, Inc. Generation, management, and tracking of digital credentials US10228967B2 (en) 2016-06-01 2019-03-12 Red Hat, Inc. Non-repudiable transaction protocol US10931676B2 (en) * 2016-09-21 2021-02-23 Fyfo Llc Conditional delivery of content over a communication network including social sharing and video conference applications using facial recognition USRE50264E1 (en) * 2016-09-21 2025-01-07 Fyfo Llc Securely managing access to a computer-implemented process using facial recognition and facial detection EP4120107A1 (en) * 2016-11-14 2023-01-18 MasterCard International Incorporated Method for biometric based signing of document US9680838B1 (en) * 2016-11-17 2017-06-13 Global Tel*Link Corporation System and method for communicating with inmates in privileged communication US20180182052A1 (en) * 2016-12-20 2018-06-28 Microshare, Inc. Policy Fabric And Sharing System For Enabling Multi-Party Data Processing In An IoT Environment US10713714B2 (en) * 2017-01-10 2020-07-14 Escrowtab, Inc. Escrow tab mobile application system and method US11019010B2 (en) 2017-01-13 2021-05-25 Walmart Apollo, Llc Electronic communications in connection with a package delivery US10192221B2 (en) * 2017-03-10 2019-01-29 Capital One Services, Llc Systems and methods for image capture vector format lasering engine US10937103B1 (en) 2017-04-21 2021-03-02 Allstate Insurance Company Machine learning based accident assessment US11182349B2 (en) * 2017-06-04 2021-11-23 Apple Inc. Synchronizing content US10447486B2 (en) * 2017-07-19 2019-10-15 Spyrus, Inc. Remote attestation of a security module's assurance level US11270295B2 (en) * 2017-08-01 2022-03-08 Digital Asset (Switzerland) GmbH Method and apparatus for automated committed settlement of digital assets WO2019032643A1 (en) * 2017-08-08 2019-02-14 Quio Technologies, Llc Self-executing agents for gathering health information between trusted parties US20190087831A1 (en) 2017-09-15 2019-03-21 Pearson Education, Inc. Generating digital credentials based on sensor feedback data US10949848B2 (en) * 2017-10-26 2021-03-16 Mastercard International Incorporated Access to ACH transaction functionality via digital wallets US10803104B2 (en) 2017-11-01 2020-10-13 Pearson Education, Inc. Digital credential field mapping EP3502994A1 (en) 2017-12-22 2019-06-26 Mastercard International Incorporated Method and system for trusted notifications US11227318B2 (en) 2018-02-01 2022-01-18 Capital One Services, Llc Systems and methods for authenticated delivery by unmanned vehicle (UV) WO2020092245A1 (en) * 2018-10-29 2020-05-07 Zorday IP, LLC Network-enabled electronic cigarette US11756147B1 (en) * 2019-03-27 2023-09-12 United Services Automobile Association (Usaa) Systems and methods for verifying the authenticity of documents US11153315B2 (en) * 2019-05-30 2021-10-19 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers US11496305B2 (en) * 2019-09-24 2022-11-08 Charter Communications Operating, Llc Item integrity verification US12026247B2 (en) 2019-09-25 2024-07-02 Amod Ashok Dange System and method for enabling a user to create an account on an application or login into the application without having the user reveal their identity US12079367B2 (en) * 2019-09-25 2024-09-03 Amod Ashok Dange System and method for enabling social network users to grant their connections granular visibility into their personal data without granting the same visibility to the network operator US12072963B2 (en) * 2019-09-25 2024-08-27 Amod Ashok Dange System and method for affixing a signature using biometric authentication US12028347B2 (en) 2019-09-25 2024-07-02 Amod Ashok Dange System and method for enabling a user to obtain authenticated access to an application using a biometric combination lock US12111899B2 (en) 2019-10-21 2024-10-08 Gentex Corporation Authentication systems and methods for aerospace systems US11356367B2 (en) * 2019-11-22 2022-06-07 Red Hat, Inc. Secure preloading of serverless function sequences CN111586021B (en) * 2020-04-30 2022-02-08 æ²³åçäºå®å¤§æ°æ®å®å ¨é²æ¤äº§ä¸ææ¯ç ç©¶é¢æéå ¬å¸ Remote office business authorization method, terminal and system EP3923167A1 (en) * 2020-06-10 2021-12-15 Siemens Aktiengesellschaft Method for creating an automated security analysis of an installation, device and computer program product US11989743B2 (en) * 2020-09-11 2024-05-21 Changxin Memory Technologies, Inc. System and method for processing public sentiment, computer storage medium and electronic device US11368459B2 (en) * 2020-09-30 2022-06-21 International Business Machines Corporation Providing isolated containers for user request processing US20220245744A1 (en) * 2021-01-31 2022-08-04 Meyyappan Alagappan Methods and systems of an unbiased middle entity to legally verify and/or notarizes digital interactions along with interaction data between parties US20230059465A1 (en) * 2021-02-05 2023-02-23 Jonathan SIEGEL System and method for an electronic signature device US11711555B1 (en) * 2021-03-31 2023-07-25 Amazon Technologies, Inc. Protecting media content integrity across untrusted networks US12235976B2 (en) 2021-05-12 2025-02-25 Fyfo Llc Authenticated and authorized transfer of content over a communication network CN113282543B (en) * 2021-05-20 2022-07-05 æ¯ä»å®(æå·)ä¿¡æ¯ææ¯æéå ¬å¸ Verifiable searchable encryption method, device and equipment with forward security US11831688B2 (en) * 2021-06-18 2023-11-28 Capital One Services, Llc Systems and methods for network security US12073839B2 (en) * 2022-03-24 2024-08-27 Capital One Services, Llc Authentication by speech at a machine US20230410072A1 (en) * 2022-06-20 2023-12-21 Tantamount Labs Systems and methods for enhanced non-fungible tokens US12327217B2 (en) 2022-06-30 2025-06-10 DoorDash, Inc. Efficient and accurate return package deliveries with distributed fleet US12225136B2 (en) * 2022-07-20 2025-02-11 Bank Of America Corporation Generating synthetic invisible fingerprints for metadata security and document verification using generative artificial intelligence US20240037200A1 (en) * 2022-07-29 2024-02-01 Tywana Woodley Real Estate Transactions Authorization Device and Method of Use Thereof US12333843B2 (en) 2022-09-23 2025-06-17 Escrowtab, Inc. Systems and methods for secure management of document execution US20240127201A1 (en) * 2022-10-18 2024-04-18 Vivid Seats Llc Ticketing validation and fulfillment system and method Citations (95) * Cited by examiner, â Cited by third party Publication number Priority date Publication date Assignee Title US3790700A (en) * 1971-12-17 1974-02-05 Hughes Aircraft Co Catv program control system US3796830A (en) * 1971-11-02 1974-03-12 Ibm Recirculating block cipher cryptographic system US3798359A (en) * 1971-06-30 1974-03-19 Ibm Block cipher cryptographic system US3798605A (en) * 1971-06-30 1974-03-19 Ibm Centralized verification system US3798360A (en) * 1971-06-30 1974-03-19 Ibm Step code ciphering system US3931504A (en) * 1972-02-07 1976-01-06 Basic Computing Arts, Inc. Electronic data processing security system and method US3946220A (en) * 1974-06-10 1976-03-23 Transactron, Inc. Point-of-sale system and apparatus US3946200A (en) * 1975-02-24 1976-03-23 Gca Corporation Proportional temperature controller US4071911A (en) * 1975-04-22 1978-01-31 Continental Can Co. Inc. Machine control system with machine serializing and safety circuits US4141005A (en) * 1976-11-11 1979-02-20 International Business Machines Corporation Data format converting apparatus for use in a digital data processor US4183085A (en) * 1976-11-18 1980-01-08 International Business Machines Corporation Protection of data processing system against unauthorized programs US4246638A (en) * 1978-09-14 1981-01-20 Thomas William J Method and apparatus for controlling usage of a programmable computing machine US4253157A (en) * 1978-09-29 1981-02-24 Alpex Computer Corp. Data access system wherein subscriber terminals gain access to a data bank by telephone lines US4259720A (en) * 1978-01-09 1981-03-31 Interbank Card Association Security system for electronic funds transfer system US4309569A (en) * 1979-09-05 1982-01-05 The Board Of Trustees Of The Leland Stanford Junior University Method of providing digital signatures US4319079A (en) * 1979-09-13 1982-03-09 Best Robert M Crypto microprocessor using block cipher US4321672A (en) * 1979-11-26 1982-03-23 Braun Edward L Financial data processing system US4375579A (en) * 1980-01-30 1983-03-01 Wisconsin Alumni Research Foundation Database encryption and decryption circuit and method using subkeys US4433207A (en) * 1981-09-10 1984-02-21 Best Robert M Cryptographic decoder for computer programs US4434464A (en) * 1980-04-01 1984-02-28 Hitachi, Ltd. Memory protection system for effecting alteration of protection information without intervention of control program US4494156A (en) * 1982-05-14 1985-01-15 Media Systems Technology Selectable format computer disk copier machine US4573119A (en) * 1983-07-11 1986-02-25 Westheimer Thomas O Computer software protection system US4577289A (en) * 1983-12-30 1986-03-18 International Business Machines Corporation Hardware key-on-disk system for copy-protecting magnetic storage media US4578530A (en) * 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation US4634807A (en) * 1984-08-23 1987-01-06 National Research Development Corp. Software protection device US4644493A (en) * 1984-09-14 1987-02-17 International Business Machines Corporation Implementing a shared higher level of privilege on personal computers for copy protection of software US4646234A (en) * 1984-02-29 1987-02-24 Brigham Young University Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs US4649515A (en) * 1984-04-30 1987-03-10 Westinghouse Electric Corp. Methods and apparatus for system fault diagnosis and control US4652990A (en) * 1983-10-27 1987-03-24 Remote Systems, Inc. Protected software access control apparatus and method US4796220A (en) * 1986-12-15 1989-01-03 Pride Software Development Corp. Method of controlling the copying of software US4796181A (en) * 1986-10-24 1989-01-03 Wiedemer John D Billing system for computer software US4799156A (en) * 1986-10-01 1989-01-17 Strategic Processing Corporation Interactive market management system US4807288A (en) * 1982-11-30 1989-02-21 C.I.I. Honeywell Bull Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system US4817140A (en) * 1986-11-05 1989-03-28 International Business Machines Corp. Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor US4816655A (en) * 1985-12-11 1989-03-28 Centre D'etude De L'energie Nucleaire, "C.E.N." Method and apparatus for checking the authenticity of individual-linked documents and the identity of the holders thereof US4893332A (en) * 1986-05-12 1990-01-09 Aquatrol Corporation Low-powered remote sensor US4893248A (en) * 1987-02-06 1990-01-09 Access Corporation Monitoring and reporting system for remote terminals US4907269A (en) * 1987-09-30 1990-03-06 Deutsche Thomson-Brandt Gmbh Process and circuit layout for the recognition of an identification sign (signum) contained in a video signal US4995082A (en) * 1989-02-24 1991-02-19 Schnorr Claus P Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system US4999806A (en) * 1987-09-04 1991-03-12 Fred Chernow Software distribution system US5001752A (en) * 1989-10-13 1991-03-19 Fischer Addison M Public/key date-time notary facility US5079948A (en) * 1991-01-28 1992-01-14 Mobil Oil Corporation Method for conducting capillary pressure drainage and imbibition on a core sample of a porous rock US5091966A (en) * 1990-07-31 1992-02-25 Xerox Corporation Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes US5185717A (en) * 1988-08-05 1993-02-09 Ryoichi Mori Tamper resistant module having logical elements arranged in multiple layers on the outer surface of a substrate to protect stored information US5187787A (en) * 1989-07-27 1993-02-16 Teknekron Software Systems, Inc. Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes US5191573A (en) * 1988-06-13 1993-03-02 Hair Arthur R Method for transmitting a desired digital video or audio signal US5191613A (en) * 1990-11-16 1993-03-02 Graziano James M Knowledge based system for document authentication US5199074A (en) * 1992-01-06 1993-03-30 Advanced Micro Devices, Inc. Encryption system US5199066A (en) * 1989-04-18 1993-03-30 Special Effects Software, Inc. Method and apparatus for protecting software US5276901A (en) * 1991-12-16 1994-01-04 International Business Machines Corporation System for controlling group access to objects using group access control folder and group identification as individual user US5276735A (en) * 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system US5280479A (en) * 1991-06-18 1994-01-18 Matra Communication Device for insertion of digital packets in a transmission channel US5283830A (en) * 1991-12-17 1994-02-01 International Computers Limited Security mechanism for a computer system US5285494A (en) * 1992-07-31 1994-02-08 Pactel Corporation Network management system US5287407A (en) * 1990-05-31 1994-02-15 International Business Machines Corporation Computer software protection US5291598A (en) * 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software US5383113A (en) * 1991-07-25 1995-01-17 Checkfree Corporation System and method for electronically providing customer services including payment of bills, financial analysis and loans US5388211A (en) * 1989-04-28 1995-02-07 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software US5390297A (en) * 1987-11-10 1995-02-14 Auto-Trol Technology Corporation System for controlling the number of concurrent copies of a program in a network based on the number of available licenses US5390247A (en) * 1992-04-06 1995-02-14 Fischer; Addison M. Method and apparatus for creating, supporting, and using travelling programs US5390330A (en) * 1993-02-11 1995-02-14 Talati; Kirit K. Control system and method for direct execution of software application information models without code generation US5392390A (en) * 1992-04-10 1995-02-21 Intellilink Corp. Method for mapping, translating, and dynamically reconciling data between disparate computer platforms US5392220A (en) * 1990-04-13 1995-02-21 U.S. Philips Corporation Method and system for organizing data US5394469A (en) * 1994-02-18 1995-02-28 Infosafe Systems, Inc. Method and apparatus for retrieving secure information from mass storage media US5485622A (en) * 1991-10-11 1996-01-16 Kabushiki Kaisha Toshiba Password processing system for computer US5490216A (en) * 1992-09-21 1996-02-06 Uniloc Private Limited System for software registration US5491800A (en) * 1993-12-20 1996-02-13 Taligent, Inc. Object-oriented remote procedure call networking system US5497479A (en) * 1989-04-28 1996-03-05 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software US5497491A (en) * 1993-01-26 1996-03-05 International Business Machines Corporation System and method for importing and exporting data between an object oriented computing environment and an external computing environment US5499298A (en) * 1994-03-17 1996-03-12 National University Of Singapore Controlled dissemination of digital information US5592549A (en) * 1995-06-15 1997-01-07 Infosafe Systems, Inc. Method and apparatus for retrieving selected information from a secure information source US5603031A (en) * 1993-07-08 1997-02-11 General Magic, Inc. System and method for distributed computation based upon the movement, execution, and interaction of processes in a network US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method US5613004A (en) * 1995-06-07 1997-03-18 The Dice Company Steganographic method and device US5710834A (en) * 1995-05-08 1998-01-20 Digimarc Corporation Method and apparatus responsive to a code signal conveyed through a graphic image US5715314A (en) * 1994-10-24 1998-02-03 Open Market, Inc. Network sales system US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar US5717923A (en) * 1994-11-03 1998-02-10 Intel Corporation Method and apparatus for dynamically customizing electronic information to individual end users US5721781A (en) * 1995-09-13 1998-02-24 Microsoft Corporation Authentication system and method for smart card transactions US5721788A (en) * 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures US5724425A (en) * 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software US5724424A (en) * 1993-12-16 1998-03-03 Open Market, Inc. Digital active advertising US5732398A (en) * 1995-11-09 1998-03-24 Keyosk Corp. Self-service system for selling travel-related services or products US5734719A (en) * 1993-10-15 1998-03-31 International Business Systems, Incorporated Digital information accessing, delivery and production system US5878421A (en) * 1995-07-17 1999-03-02 Microsoft Corporation Information map US6026193A (en) * 1993-11-18 2000-02-15 Digimarc Corporation Video steganography US6044205A (en) * 1996-02-29 2000-03-28 Intermind Corporation Communications system for transferring information between memories according to processes transferred with the information US6185683B1 (en) * 1995-02-13 2001-02-06 Intertrust Technologies Corp. Trusted and secure techniques, systems and methods for item delivery and execution US20020023214A1 (en) * 1996-08-12 2002-02-21 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments US20030023856A1 (en) * 2001-06-13 2003-01-30 Intertrust Technologies Corporation Software self-checking systems and methods US6519615B1 (en) * 1996-10-11 2003-02-11 Sun Microsystems, Inc. Method and system for leasing storage US20030046244A1 (en) * 1997-11-06 2003-03-06 Intertrust Technologies Corp. Methods for matching, selecting, and/or classifying based on rights management and/or other information US20040054630A1 (en) * 1995-02-13 2004-03-18 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection US20040059951A1 (en) * 2002-04-25 2004-03-25 Intertrust Technologies Corporation Secure authentication systems and methods US20050027871A1 (en) * 2003-06-05 2005-02-03 William Bradley Interoperable systems and methods for peer-to-peer service orchestration Family Cites Families (495) * Cited by examiner, â Cited by third party Publication number Priority date Publication date Assignee Title US531985A (en) * 1895-01-01 Edward wagner US845391A (en) * 1906-04-05 1907-02-26 Gen Storage Battery Company Negative-pole plate. US3609697A (en) 1968-10-21 1971-09-28 Ibm Program security device US3573747A (en) 1969-02-24 1971-04-06 Institutional Networks Corp Instinet communication system for effectuating the sale or exchange of fungible properties between subscribers US3845391A (en) 1969-07-08 1974-10-29 Audicom Corp Communication including submerged identification signal GB1414126A (en) 1971-11-22 1975-11-19 Key Tronic Ltd Secutity for computer systems SE381940B (en) 1972-04-11 1975-12-22 Gretag Ag DEVICE FOR INDIVIDUAL IDENTIFICATION OF A MAJORITY OF INDIVIDUALS US3911397A (en) 1972-10-24 1975-10-07 Information Identification Inc Access control assembly US3829833A (en) 1972-10-24 1974-08-13 Information Identification Co Code element identification method and apparatus GB1494736A (en) 1974-01-21 1977-12-14 Chubb Integrated Syst Ltd Token-control US3924065A (en) 1974-04-05 1975-12-02 Information Identification Inc Coherent, fixed BAUD rate FSK communication method and apparatus US3956615A (en) 1974-06-25 1976-05-11 Ibm Corporation Transaction execution system with secure data storage and communications US3970992A (en) 1974-06-25 1976-07-20 Ibm Corporation Transaction terminal with unlimited range of functions US3906448A (en) 1974-08-01 1975-09-16 Rca Corp Fault detection facilitating means for card reader of identification card reading system US4270182A (en) 1974-12-30 1981-05-26 Asija Satya P Automated information input, storage, and retrieval system US3958081A (en) 1975-02-24 1976-05-18 International Business Machines Corporation Block cipher system for data security US4209787A (en) 1975-04-16 1980-06-24 Gould Inc. Method for monitoring the location of monitored objects US4217588A (en) 1975-04-16 1980-08-12 Information Identification Company, Inc. Object monitoring method and apparatus US4112421A (en) 1975-04-16 1978-09-05 Information Identification Company, Inc. Method and apparatus for automatically monitoring objects US3996449A (en) 1975-08-25 1976-12-07 International Business Machines Corporation Operating system authenticator US4196310A (en) 1976-04-09 1980-04-01 Digital Data, Inc. Secure SCA broadcasting system including subscriber actuated portable receiving terminals JPS533029A (en) 1976-06-30 1978-01-12 Toshiba Corp Electronic computer US4048619A (en) 1976-09-07 1977-09-13 Digital Data Inc. Secure two channel sca broadcasting system JPS57726Y2 (en) 1976-09-10 1982-01-07 US4104721A (en) 1976-12-30 1978-08-01 International Business Machines Corporation Hierarchical security mechanism for dynamically assigning security levels to object programs US4120030A (en) 1977-03-11 1978-10-10 Kearney & Trecker Corporation Computer software security system US4162483A (en) 1977-04-01 1979-07-24 Intech Laboratories, Inc. Bilateral master station-plural satellite station signalling apparatus US4200913A (en) 1977-04-13 1980-04-29 International Business Machines Corporation Operator controlled programmable keyboard apparatus GB1553027A (en) 1977-05-12 1979-09-19 Marconi Co Ltd Message signal scrambling apparatus US4220991A (en) 1977-10-08 1980-09-02 Tokyo Electric Co., Ltd. Electronic cash register with removable memory packs for cashier identification US4168396A (en) 1977-10-31 1979-09-18 Best Robert M Microprocessor for executing enciphered programs US4278837A (en) 1977-10-31 1981-07-14 Best Robert M Crypto microprocessor for executing enciphered programs US4405829A (en) 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method US4262329A (en) 1978-03-27 1981-04-14 Computation Planning, Inc. Security system for data processing US4265371A (en) 1978-10-06 1981-05-05 Trafalgar Industries Inc. Foodstuff vending apparatus employing improved solid-state type control apparatus US4232317A (en) 1978-11-01 1980-11-04 Freeny Jr Charles C Quantized hyperbolic and inverse hyperbolic object location system US4305131A (en) 1979-02-05 1981-12-08 Best Robert M Dialog between TV movies and human viewers FR2448825A1 (en) 1979-02-06 1980-09-05 Telediffusion Fse SYSTEM FOR TRANSMITTING INFORMATION BETWEEN A TRANSMISSION CENTER AND RECEIVING STATIONS, WHICH IS PROVIDED WITH A MEANS OF CONTROLLING ACCESS TO THE INFORMATION TRANSMITTED FR2448824A1 (en) 1979-02-06 1980-09-05 Telediffusion Fse VIDEOTEX SYSTEM PROVIDED WITH INFORMATION ACCESS CONTROL MEANS US4598288A (en) 1979-04-16 1986-07-01 Codart, Inc. Apparatus for controlling the reception of transmitted programs US4236217A (en) 1979-04-20 1980-11-25 Kennedy Stanley P Energy utilization or consumption recording arrangement US4465901A (en) 1979-06-04 1984-08-14 Best Robert M Crypto microprocessor that executes enciphered programs DE2943436A1 (en) 1979-10-26 1981-05-07 Wolfram Dr.-Ing. 5100 Aachen Szepanski Security coding system for documents - has cover coding printed on document and optically scanned for comparison with normal text FR2469760A1 (en) 1979-11-09 1981-05-22 Cii Honeywell Bull METHOD AND SYSTEM FOR IDENTIFYING PEOPLE REQUESTING ACCESS TO CERTAIN MEDIA US4328544A (en) 1980-01-04 1982-05-04 International Business Machines Corporation Electronic point-of-sale system using direct-access storage US4306289A (en) 1980-02-04 1981-12-15 Western Electric Company, Inc. Digital computer having code conversion apparatus for an encrypted program US4361877A (en) 1980-02-05 1982-11-30 Sangamo Weston, Inc. Billing recorder with non-volatile solid state memory US4529870A (en) 1980-03-10 1985-07-16 David Chaum Cryptographic identification, financial transaction, and credential device JPS57726A (en) 1980-05-30 1982-01-05 Usac Electronics Ind Co Ltd Operation controlling system of information processor CA1183950A (en) 1980-09-26 1985-03-12 Bo Lofberg Method for processing an information signal and means for carrying out the method US4442484A (en) 1980-10-14 1984-04-10 Intel Corporation Microprocessor memory management and protection mechanism US4513174A (en) 1981-03-19 1985-04-23 Standard Microsystems Corporation Software security method using partial fabrication of proprietary control word decoders and microinstruction memories US4446519A (en) 1981-05-26 1984-05-01 Corban International, Ltd. Method and apparatus for providing security for computer software US4471163A (en) 1981-10-05 1984-09-11 Donald Thomas C Software protection system US4670857A (en) 1981-10-26 1987-06-02 Rackman Michael I Cartridge-controlled system whose use is limited to authorized cartridges US4593353A (en) 1981-10-26 1986-06-03 Telecommunications Associates, Inc. Software protection method and apparatus US4454594A (en) 1981-11-25 1984-06-12 U.S. Philips Corporation Method and apparatus to secure proprietary operation of computer equipment US4442486A (en) 1981-11-25 1984-04-10 U.S. Philips Corporation Protected programmable apparatus US4553252A (en) 1981-12-21 1985-11-12 Egendorf Harris H Counting computer software cartridge HU183765B (en) 1981-12-23 1984-05-28 Phylaxia Oltoanyagtermeloe Process for producing lyophilized vaccine against duck hepatitis EP0084441A3 (en) 1982-01-19 1984-08-22 Tabs Limited Method and apparatus for the protection of proprietary computer software US4458315A (en) 1982-02-25 1984-07-03 Penta, Inc. Apparatus and method for preventing unauthorized use of computer programs AU542447B2 (en) 1982-02-27 1985-02-21 Fujitsu Limited System for controlling key storage unit FR2523745B1 (en) 1982-03-18 1987-06-26 Bull Sa METHOD AND DEVICE FOR PROTECTING SOFTWARE DELIVERED BY A SUPPLIER TO A USER GB2119992B (en) 1982-05-06 1985-10-30 Tokyo Shibaura Electric Co Automatic transaction machine US4484217A (en) 1982-05-11 1984-11-20 Telease, Inc. Method and system for remote reporting, particularly for pay television billing US4525599A (en) 1982-05-21 1985-06-25 General Computer Corporation Software protection methods and apparatus US4462076A (en) 1982-06-04 1984-07-24 Smith Engineering Video game cartridge recognition and security system US4523271A (en) 1982-06-22 1985-06-11 Levien Raphael L Software protection method and apparatus US4590552A (en) 1982-06-30 1986-05-20 Texas Instruments Incorporated Security bit for designating the security status of information stored in a nonvolatile memory US4462078A (en) 1982-08-02 1984-07-24 Ron Ross Computer program protection method US4558176A (en) 1982-09-20 1985-12-10 Arnold Mark G Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software US4562305A (en) 1982-12-22 1985-12-31 International Business Machines Corporation Software cryptographic apparatus and method US4609985A (en) 1982-12-30 1986-09-02 Thomson Components-Mostek Corporation Microcomputer with severable ROM US4528643A (en) 1983-01-10 1985-07-09 Fpdc, Inc. System for reproducing information in material objects at a point of sale location US4588991A (en) 1983-03-07 1986-05-13 Atalla Corporation File access security method and means US4680731A (en) 1983-03-17 1987-07-14 Romox Incorporated Reprogrammable cartridge memory with built-in identification circuitry and programming method US4593376A (en) 1983-04-21 1986-06-03 Volk Larry N System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expires US4597058A (en) 1983-05-09 1986-06-24 Romox, Inc. Cartridge programming system WO1984004614A1 (en) 1983-05-13 1984-11-22 Ira Dennis Gale Data security device US4658093A (en) 1983-07-11 1987-04-14 Hellman Martin E Software distribution system FR2550638A1 (en) 1983-08-11 1985-02-15 Christophe Leveque DEVICE FOR PROTECTING SOFTWARE USED BY A COMPUTER CONNECTED TO AT LEAST ONE PERIPHERAL TERMINAL US4926480A (en) 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems US4621334A (en) 1983-08-26 1986-11-04 Electronic Signature Lock Corporation Personal identification apparatus US4584641A (en) 1983-08-29 1986-04-22 Paul Guglielmino Copyprotecting system for software protection US4562306A (en) 1983-09-14 1985-12-31 Chou Wayne W Method and apparatus for protecting computer software utilizing an active coded hardware device US5103392A (en) 1983-10-05 1992-04-07 Fujitsu Limited System for storing history of use of programs including user credit data and having access by the proprietor US4768087A (en) 1983-10-07 1988-08-30 National Information Utilities Corporation Education utility GB2149944A (en) 1983-11-14 1985-06-19 Softnet Inc Software distribution US4558413A (en) 1983-11-21 1985-12-10 Xerox Corporation Software version management system US4740890A (en) 1983-12-22 1988-04-26 Software Concepts, Inc. Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media US4584639A (en) 1983-12-23 1986-04-22 Key Logic, Inc. Computer security system EP0203066A1 (en) 1984-02-03 1986-12-03 GUIGNARD, Paul Security and usage monitoring US4621321A (en) 1984-02-16 1986-11-04 Honeywell Inc. Secure data processing system architecture US4599489A (en) 1984-02-22 1986-07-08 Gordian Systems, Inc. Solid state key for controlling access to computer software US4609777A (en) 1984-02-22 1986-09-02 Gordian Systems, Inc. Solid state key for controlling access to computer software US4672605A (en) 1984-03-20 1987-06-09 Applied Spectrum Technologies, Inc. Data and voice communications system US4748561A (en) 1984-05-14 1988-05-31 Mark Brown Method of protecting computer software US4672572A (en) 1984-05-21 1987-06-09 Gould Inc. Protector system for computer access and use US4712238A (en) 1984-06-08 1987-12-08 M/A-Com Government Systems, Inc. Selective-subscription descrambling US4791565A (en) 1984-06-20 1988-12-13 Effective Security Systems, Inc. Apparatus for controlling the use of computer software US4562495A (en) 1984-07-02 1985-12-31 Verbatim Corporation Multiple system disk US4747139A (en) 1984-08-27 1988-05-24 Taaffe James L Software security method and systems BE900479A (en) 1984-08-31 1984-12-17 Smets Raph Magnetic recording disc for computer data - has sector subjected to different treatment to prevent unauthorised copying US4677552A (en) 1984-10-05 1987-06-30 Sibley Jr H C International commodity trade exchange US4696034A (en) 1984-10-12 1987-09-22 Signal Security Technologies High security pay television system US4677434A (en) 1984-10-17 1987-06-30 Lotus Information Network Corp. Access control system for transmitting data from a central station to a plurality of receiving stations and method therefor DE3579785D1 (en) 1984-10-31 1990-10-25 Sony Corp DECODING DEVICES FOR TELEVISION TV SYSTEMS. JPS61121145A (en) 1984-11-19 1986-06-09 Matsushita Electric Ind Co Ltd Soft copy limiting method CA1238427A (en) 1984-12-18 1988-06-21 Jonathan Oseas Code protection using cryptography JPS61166652A (en) 1985-01-19 1986-07-28 Panafacom Ltd Interruption generating system using exceptional memory protection US4713753A (en) 1985-02-21 1987-12-15 Honeywell Inc. Secure data processing system architecture with format control US4888798A (en) 1985-04-19 1989-12-19 Oms, Inc. Modular software security US4700296A (en) 1985-04-19 1987-10-13 Palmer Jr Roy A Electronic access control system US4688169A (en) 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system US4685056A (en) 1985-06-11 1987-08-04 Pueblo Technologies, Inc. Computer security device US4685055A (en) 1985-07-01 1987-08-04 Thomas Richard B Method and system for controlling use of protected software US4683968A (en) 1985-09-03 1987-08-04 Burroughs Corporation System for preventing software piracy employing multi-encrypted keys and single decryption circuit modules US4885777A (en) * 1985-09-04 1989-12-05 Hitachi, Ltd. Electronic transaction system US5018196A (en) * 1985-09-04 1991-05-21 Hitachi, Ltd. Method for electronic transaction with digital signature US4757533A (en) 1985-09-11 1988-07-12 Computer Security Corporation Security system for microcomputers US4727550A (en) 1985-09-19 1988-02-23 Chang David B Radiation source GB2182467B (en) 1985-10-30 1989-10-18 Ncr Co Security device for stored sensitive data US5208748A (en) 1985-11-18 1993-05-04 Action Technologies, Inc. Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants US5216603A (en) 1985-11-18 1993-06-01 Action Technologies, Inc. Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants DE3601983A1 (en) 1986-01-23 1987-07-30 Siemens Ag METHOD AND DEVICE FOR CONTACTLESS DETERMINATION OF TEMPERATURE DISTRIBUTION IN AN EXAMINATION OBJECT JPH0784852B2 (en) 1986-03-06 1995-09-13 æ ªå¼ä¼ç¤¾æé»è Cogeneration system US5759101A (en) 1986-03-10 1998-06-02 Response Reward Systems L.C. Central and remote evaluation of responses of participatory broadcast audience with automatic crediting and couponing US4864494A (en) 1986-03-21 1989-09-05 Computerized Data Ssytems For Mfg., Inc. Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software JPS62225059A (en) 1986-03-27 1987-10-03 Toshiba Electric Equip Corp Mulitiple dwelling housing information system JPS62241061A (en) 1986-04-11 1987-10-21 Nec Corp Information access management system JPH0756794B2 (en) 1986-04-23 1995-06-14 æ¥æ¬æ¿ç¡åæ ªå¼ä¼ç¤¾ Sealed lead acid battery separator US4823264A (en) 1986-05-27 1989-04-18 Deming Gilbert R Electronic funds transfer system JPH06103058B2 (en) 1986-06-16 1994-12-14 æ±æµ·ã´ã å·¥æ¥æ ªå¼ä¼ç¤¾ Torsional damper with excellent burst resistance US4780821A (en) 1986-07-29 1988-10-25 International Business Machines Corp. Method for multiple programs management within a network having a server computer and a plurality of remote computers GB8619989D0 (en) 1986-08-16 1986-09-24 Modray Ltd Controlling length of time KR960000452B1 (en) 1986-08-25 1996-01-06 ìë ê°ë¶ìë¼ê°ì´ì¤ Disc device and disc-like recording medium US5014234A (en) 1986-08-25 1991-05-07 Ncr Corporation System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software US5010571A (en) 1986-09-10 1991-04-23 Titan Linkabit Corporation Metering retrieval of encrypted data stored in customer data retrieval terminal US4977594A (en) 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method US5050213A (en) 1986-10-14 1991-09-17 Electronic Publishing Resources, Inc. Database usage metering and protection system and method US4827508A (en) 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method US5047928A (en) 1986-10-24 1991-09-10 Wiedemer John D Billing system for computer software US5155680A (en) 1986-10-24 1992-10-13 Signal Security Technologies Billing system for computing software US5109413A (en) 1986-11-05 1992-04-28 International Business Machines Corporation Manipulating rights-to-execute in connection with a software copy protection mechanism US5146575A (en) 1986-11-05 1992-09-08 International Business Machines Corp. Implementing privilege on microprocessor systems for use in software asset protection JPS63129564A (en) 1986-11-19 1988-06-01 Fujitsu Ltd Method for preventing unauthorized copying of recording media US4858121A (en) 1986-12-12 1989-08-15 Medical Payment Systems, Incorporated Medical payment system US4757914A (en) 1987-01-27 1988-07-19 Continental Can Company, Inc. Laminated closure for a plastic container US4881197A (en) 1987-02-13 1989-11-14 Addison Fischer Document composition system using named formats and named fonts US5224160A (en) 1987-02-23 1993-06-29 Siemens Nixdorf Informationssysteme Ag Process for securing and for checking the integrity of the secured programs JPS63289646A (en) 1987-05-22 1988-11-28 Nec Corp Program module managing system US4975647A (en) 1987-06-01 1990-12-04 Nova Biomedical Corporation Controlling machine operation with respect to consumable accessory units US4930073A (en) 1987-06-26 1990-05-29 International Business Machines Corporation Method to prevent use of incorrect program version in a computer system US5070400A (en) 1987-06-30 1991-12-03 Comsat Pay-tv time purchase scheme US4866769A (en) 1987-08-05 1989-09-12 Ibm Corporation Hardware assist for protecting PC software US5206951A (en) 1987-08-21 1993-04-27 Wang Laboratories, Inc. Integration of data between typed objects by mutual, direct invocation between object managers corresponding to object types DE3876617T2 (en) 1987-09-04 1993-04-08 Digital Equipment Corp CONNECTION CONTROL IN A NETWORK FOR A DIGITAL DATA PROCESSING SYSTEM THAT SUPPLIES MULTIPLE TRANSMISSION PROTOCOLS. US5005122A (en) 1987-09-08 1991-04-02 Digital Equipment Corporation Arrangement with cooperating management server node and network service node JP2723231B2 (en) 1987-09-10 1998-03-09 äº®ä¸ æ£® Software rights management control method US4864616A (en) 1987-10-15 1989-09-05 Micronyx, Inc. Cryptographic labeling of electronically stored data JPH0731652Y2 (en) 1987-10-29 1995-07-19 ã·ã£ã¼ãæ ªå¼ä¼ç¤¾ Printing system JPH0635807Y2 (en) 1988-01-21 1994-09-21 ã¹ãºãæ ªå¼ä¼ç¤¾ Vehicle garnish mounting structure US4975878A (en) 1988-01-28 1990-12-04 National Semiconductor Programmable memory data protection scheme DE3803982A1 (en) 1988-02-10 1990-01-25 Igor Groza Data carrier with duplication prevention US4868877A (en) 1988-02-12 1989-09-19 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification US5214702A (en) 1988-02-12 1993-05-25 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification US5005200A (en) 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification US4937863A (en) 1988-03-07 1990-06-26 Digital Equipment Corporation Software licensing management system JP2635087B2 (en) 1988-03-25 1997-07-30 æ ªå¼ä¼ç¤¾æ¥ç«è£½ä½æ Process control method JPH01248891A (en) 1988-03-30 1989-10-04 Kondeishiyonaru Akusesu Technol Kenkyusho:Kk Encipherment key delivery system GB8809346D0 (en) 1988-04-20 1988-05-25 Emi Plc Thorn Improvements relating to marked recorded signals US4903269A (en) * 1988-05-16 1990-02-20 General Electric Company Error detector for encoded digital signals JPH01296363A (en) 1988-05-24 1989-11-29 Sanyo Electric Co Ltd System for protecting storing medium US5113518A (en) 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software US4924378A (en) 1988-06-13 1990-05-08 Prime Computer, Inc. License mangagement system and license storage key EP0472521B1 (en) 1988-08-16 1998-06-03 Cryptologics International Inc. Information distribution system US5247575A (en) 1988-08-16 1993-09-21 Sprague Peter J Information distribution system US5111390A (en) 1988-08-22 1992-05-05 Unisys Corporation Software security system for maintaining integrity of compiled object code by restricting users ability to define compilers US5023907A (en) 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server US4953209A (en) 1988-10-31 1990-08-28 International Business Machines Corp. Self-verifying receipt and acceptance system for electronically delivered data objects DE3841088A1 (en) 1988-12-07 1990-06-21 Mesenich Gerhard FUEL INJECTION DEVICE WITH AIR SUPPORTED FUEL SPRAYING US4949187A (en) 1988-12-16 1990-08-14 Cohen Jason M Video communications system having a remotely controlled central source of video and audio data US4919545A (en) 1988-12-22 1990-04-24 Gte Laboratories Incorporated Distributed security procedure for intelligent networks US4962533A (en) 1989-02-17 1990-10-09 Texas Instrument Incorporated Data protection for computer systems US4941175A (en) 1989-02-24 1990-07-10 International Business Machines Corporation Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstations JPH02242352A (en) 1989-03-15 1990-09-26 Nec Corp Using right setting system for data base system JPH02247763A (en) 1989-03-22 1990-10-03 Nec Corp User management system US5065429A (en) 1989-04-03 1991-11-12 Lang Gerald S Method and apparatus for protecting material on storage media US5325524A (en) 1989-04-06 1994-06-28 Digital Equipment Corporation Locating mobile objects in a distributed computer system US5227797A (en) 1989-04-25 1993-07-13 Murphy Quentin M Radar tomography JPH02294855A (en) 1989-05-10 1990-12-05 Hokkaido Nippon Denki Software Kk Sub-file using right managing system EP0398645B1 (en) 1989-05-15 1997-08-06 International Business Machines Corporation System for controlling access privileges US5075847A (en) 1989-05-26 1991-12-24 Hewlett-Packard Company Method and apparatus for computer program encapsulation US5442645A (en) 1989-06-06 1995-08-15 Bull Cp8 Method for checking the integrity of a program or data, and apparatus for implementing this method US5129084A (en) 1989-06-29 1992-07-07 Digital Equipment Corporation Object container transfer system and method in an object based computer operating system US5347579A (en) 1989-07-05 1994-09-13 Blandford Robert R Personal computer diary US5257369A (en) 1990-10-22 1993-10-26 Skeen Marion D Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes US5557798A (en) 1989-07-27 1996-09-17 Tibco, Inc. Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes US5126936A (en) 1989-09-01 1992-06-30 Champion Securities Goal-directed financial asset management system US5027397A (en) 1989-09-12 1991-06-25 International Business Machines Corporation Data protection by detection of intrusion into electronic assemblies US5138712A (en) 1989-10-02 1992-08-11 Sun Microsystems, Inc. Apparatus and method for licensing software on a network of computers US5148481A (en) 1989-10-06 1992-09-15 International Business Machines Corporation Transaction system security method and apparatus US5048085A (en) 1989-10-06 1991-09-10 International Business Machines Corporation Transaction system security method and apparatus US5136643A (en) 1989-10-13 1992-08-04 Fischer Addison M Public/key date-time notary facility US5241671C1 (en) 1989-10-26 2002-07-02 Encyclopaedia Britannica Educa Multimedia search system using a plurality of entry path means which indicate interrelatedness of information US5201047A (en) 1989-12-21 1993-04-06 International Business Machines Corporation Attribute-based classification and retrieval system US5191693A (en) 1989-12-29 1993-03-09 Canon Kabushiki Kaisha Tape type work conveying method and conveying apparatus US5163091A (en) 1990-01-29 1992-11-10 Graziano James M Knowledge based system for document authentication (apparatus) US5218605A (en) 1990-01-31 1993-06-08 Hewlett-Packard Company Software modules for testing computer hardware and software US5251294A (en) 1990-02-07 1993-10-05 Abelow Daniel H Accessing, assembling, and using bodies of information US5263165A (en) 1990-02-15 1993-11-16 International Business Machines Corporation System for providing user access control within a distributed data processing system having multiple resource managers US5263158A (en) 1990-02-15 1993-11-16 International Business Machines Corporation Method and system for variable authority level user access control in a distributed data processing system having multiple resource manager US5263157A (en) 1990-02-15 1993-11-16 International Business Machines Corporation Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles US5119493A (en) 1990-02-23 1992-06-02 International Business Machines Corporation System for recording at least one selected activity from a selected resource object within a distributed data processing system US5022080A (en) 1990-04-16 1991-06-04 Durst Robert T Electronic notary FR2662007B1 (en) 1990-05-10 1992-07-10 Bull Sa PROCESS FOR OBTAINING A SECURE CLEAR ATTESTATION IN A DISTRIBUTED COMPUTER SYSTEM ENVIRONMENT. EP0456386B1 (en) 1990-05-11 1998-11-11 International Computers Limited Access control in a distributed computer system NL9001368A (en) 1990-06-15 1992-01-02 Tel Developments B V SECURITY OF OBJECTS OR DOCUMENTS. US5050212A (en) 1990-06-20 1991-09-17 Apple Computer, Inc. Method and apparatus for verifying the integrity of a file stored separately from a computer US5201046A (en) 1990-06-22 1993-04-06 Xidak, Inc. Relational database management system and method for storing, retrieving and modifying directed graph data structures US5032979A (en) 1990-06-22 1991-07-16 International Business Machines Corporation Distributed security auditing subsystem for an operating system US5103459B1 (en) 1990-06-25 1999-07-06 Qualcomm Inc System and method for generating signal waveforms in a cdma cellular telephone system CA2044404C (en) 1990-07-31 1998-06-23 Dan S. Bloomberg Self-clocking glyph shape codes US5168147A (en) 1990-07-31 1992-12-01 Xerox Corporation Binary image processing for decoding self-clocking glyph shape codes US5128525A (en) 1990-07-31 1992-07-07 Xerox Corporation Convolution filtering for decoding self-clocking glyph shape codes US5109593A (en) 1990-08-01 1992-05-05 General Electric Company Method of melt forming a superconducting joint between superconducting tapes US5136647A (en) 1990-08-02 1992-08-04 Bell Communications Research, Inc. Method for secure time-stamping of digital documents US5136646A (en) 1991-03-08 1992-08-04 Bell Communications Research, Inc. Digital document time-stamping with catenate certificate US5058162A (en) 1990-08-09 1991-10-15 Hewlett-Packard Company Method of distributing computer data files JP3014130B2 (en) 1990-09-07 2000-02-28 å¯å£«éæ ªå¼ä¼ç¤¾ Program unauthorized use prevention method US5224163A (en) 1990-09-28 1993-06-29 Digital Equipment Corporation Method for delegating authorization from one entity to another through the use of session encryption keys US5251304A (en) 1990-09-28 1993-10-05 Motorola, Inc. Integrated circuit microcontroller with on-chip memory and external bus interface and programmable mechanism for securing the contents of on-chip memory DK0551433T3 (en) 1990-10-01 2001-07-30 Thomas A Bush transaction Processing System US5103476A (en) 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations US5222134A (en) 1990-11-07 1993-06-22 Tau Systems Corporation Secure system for activating personal computer software at remote locations US5758152A (en) 1990-12-06 1998-05-26 Prime Arithmetics, Inc. Method and apparatus for the generation and manipulation of data structures JPH0799497B2 (en) * 1990-12-14 1995-10-25 ã¤ã³ã¿ã¼ãã·ã§ãã«ã»ãã¸ãã¹ã»ãã·ã¼ã³ãºã»ã³ã¼ãã¬ã¤ã·ã§ã³ Device and method for controlling the use of software US5504818A (en) 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography US5237614A (en) 1991-06-07 1993-08-17 Security Dynamics Technologies, Inc. Integrated network security system SE513182C2 (en) 1991-06-12 2000-07-24 Icl Systems Ab Procedure and system for auditing data in a distributed computer system JPH04369068A (en) 1991-06-18 1992-12-21 Chubu Nippon Denki Software Kk User right managing system for on-line system US5309837A (en) * 1991-06-24 1994-05-10 Tani Denkikogyo Co., Ltd. Method for screen printing of paste US5204897A (en) 1991-06-28 1993-04-20 Digital Equipment Corporation Management interface for license management system US5319785A (en) 1991-06-28 1994-06-07 Digital Equipment Corporation Polling of I/O device status comparison performed in the polled I/O device US5260999A (en) 1991-06-28 1993-11-09 Digital Equipment Corporation Filters in license management system US5438508A (en) 1991-06-28 1995-08-01 Digital Equipment Corporation License document interchange format for license management system US5940504A (en) 1991-07-01 1999-08-17 Infologic Software, Inc. Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site US5577209A (en) 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network US5367621A (en) 1991-09-06 1994-11-22 International Business Machines Corporation Data processing method to provide a generalized link from a reference point in an on-line book to an arbitrary multimedia object which can be dynamically updated US5301326A (en) 1991-09-24 1994-04-05 Microsoft Corporation Method and system for controlling the execution of an application program US5355474A (en) 1991-09-27 1994-10-11 Thuraisngham Bhavani M System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification FR2681997A1 (en) 1991-09-30 1993-04-02 Arbitron Cy METHOD AND DEVICE FOR AUTOMATICALLY IDENTIFYING A PROGRAM COMPRISING A SOUND SIGNAL GB9121995D0 (en) 1991-10-16 1991-11-27 Jonhig Ltd Value transfer system US5265164A (en) 1991-10-31 1993-11-23 International Business Machines Corporation Cryptographic facility environment backup/restore and replication in a public key cryptosystem US5164988A (en) 1991-10-31 1992-11-17 International Business Machines Corporation Method to establish and enforce a network cryptographic security policy in a public key cryptosystem US5453601A (en) 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system US5557518A (en) 1994-04-28 1996-09-17 Citibank, N.A. Trusted agents for open electronic commerce US5455861A (en) 1991-12-09 1995-10-03 At&T Corp. Secure telecommunications US5150407A (en) 1991-12-16 1992-09-22 Chan Steve S C Secured data storage devices US5319735A (en) 1991-12-17 1994-06-07 Bolt Beranek And Newman Inc. Embedded signalling US5359721A (en) 1991-12-18 1994-10-25 Sun Microsystems, Inc. Non-supervisor mode cross address space dynamic linking JPH05173892A (en) 1991-12-26 1993-07-13 Nec Corp File loading system US5221833A (en) 1991-12-27 1993-06-22 Xerox Corporation Methods and means for reducing bit error rates in reading self-clocking glyph codes US5245165A (en) 1991-12-27 1993-09-14 Xerox Corporation Self-clocking glyph code for encoding dual bit digital values robustly JPH05181734A (en) 1991-12-28 1993-07-23 Hitachi Ltd Database access right management control method and file system access right management control method US5231568A (en) 1992-01-16 1993-07-27 Impact Telemedia, Inc. Promotional game method and apparatus therefor JP3311373B2 (en) 1992-01-17 2002-08-05 æ ªå¼ä¼ç¤¾ãªã³ã¼ Image reading device WO2004077300A1 (en) 1992-01-22 2004-09-10 Yoshimasa Kadooka Ic memory card and protection therefor US5335169A (en) 1992-01-27 1994-08-02 Dsi Of Hawaii, Inc. System for tracking multiple rate assessments on transactions JP2942837B2 (en) 1992-01-31 1999-08-30 æ ªå¼ä¼ç¤¾ã»ã¬ã»ã¨ã³ã¿ã¼ãã©ã¤ã¼ã¹ Security check method, game device, and information storage medium used for them US5521815A (en) 1992-01-31 1996-05-28 K.L.E. Irrevocable Trust Uniform system for verifying and tracking articles of value US5301231A (en) 1992-02-12 1994-04-05 International Business Machines Corporation User defined function facility GB2264796A (en) 1992-03-02 1993-09-08 Ibm Distributed transaction processing JP3114339B2 (en) 1992-03-13 2000-12-04 ã½ãã¼æ ªå¼ä¼ç¤¾ Recording device, reproduction device, output device, data recording method, data reproduction method, and data output method JPH05257783A (en) 1992-03-14 1993-10-08 Hitachi Ltd Replica processing method and apparatus in database JP3073590B2 (en) * 1992-03-16 2000-08-07 å¯å£«éæ ªå¼ä¼ç¤¾ Electronic data protection system, licensor's device and user's device JP2659896B2 (en) 1992-04-29 1997-09-30 ã¤ã³ã¿ã¼ãã·ã§ãã«ã»ãã¸ãã¹ã»ãã·ã¼ã³ãºã»ã³ã¼ãã¬ã¤ã·ã§ã³ Structured document copy management method and structured document copy management device US5421006A (en) 1992-05-07 1995-05-30 Compaq Computer Corp. Method and apparatus for assessing integrity of computer system software DE69323926T2 (en) 1992-05-15 1999-09-30 Addison M. Fischer Method and device for the security of a computer system with program authorization data structures US5412717A (en) 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures US5524933A (en) 1992-05-29 1996-06-11 Ecole Polytechnique Federale De Lausanne Method for the marking of documents US5349117A (en) * 1992-07-08 1994-09-20 Mobil Oil Corp. Process for sorption separation US5596718A (en) 1992-07-10 1997-01-21 Secure Computing Corporation Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor DE69332633T2 (en) 1992-07-20 2003-11-06 Compaq Computer Corp., Houston Procedure and system for discovering aliases based on certification US5235642A (en) 1992-07-21 1993-08-10 Digital Equipment Corporation Access control subsystem and method for distributed computer system using locally cached authentication credentials CA2118940A1 (en) 1992-07-31 1994-02-17 David W. Snow Apparatus and method for providing network security US5361359A (en) 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer US5819226A (en) 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling JP3084969B2 (en) 1992-10-16 2000-09-04 æ¾ä¸é»å¨ç£æ¥æ ªå¼ä¼ç¤¾ Playback device, recording device, cased recording medium, and recording medium initialization device US5319705A (en) 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement US5418559A (en) * 1992-10-23 1995-05-23 At&T Corp. Multi-channel television converter for conventional and interactive signals EP0706692B1 (en) * 1992-10-26 2003-04-16 Intellect Australia Pty. Ltd. Host and user transaction system US5535322A (en) 1992-10-27 1996-07-09 International Business Machines Corporation Data processing system with improved work flow system and method GB2295947B (en) 1992-10-27 1997-08-13 Mitsubishi Corp Pay broadcasting system US5343526A (en) 1992-10-30 1994-08-30 At&T Bell Laboratories Method for establishing licensor changeable limits on software usage US5349642A (en) 1992-11-03 1994-09-20 Novell, Inc. Method and apparatus for authentication of client server communication JPH06152585A (en) 1992-11-04 1994-05-31 Sony Corp Electronic publishing device US5432928A (en) 1992-11-10 1995-07-11 Microsoft Corporation Updating objects stored in a permanent container while preserving logical contiguity JPH06161719A (en) 1992-11-24 1994-06-10 Nec Corp Program executing device DE69318571T2 (en) 1992-12-01 1998-09-17 Microsoft Corp METHOD AND SYSTEM FOR IN-LOCAL INTERACTION WITH EMBEDDED OBJECTS US5341429A (en) 1992-12-04 1994-08-23 Testdrive Corporation Transformation of ephemeral material JPH06175794A (en) 1992-12-09 1994-06-24 Fuji Xerox Co Ltd Print processing system US5986690A (en) * 1992-12-09 1999-11-16 Discovery Communications, Inc. Electronic book selection and delivery system US5509070A (en) 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software US5373561A (en) 1992-12-21 1994-12-13 Bell Communications Research, Inc. Method of extending the validity of a cryptographic certificate JPH06215010A (en) 1993-01-14 1994-08-05 Sony Corp Information acquiring device US5630069A (en) 1993-01-15 1997-05-13 Action Technologies, Inc. Method and apparatus for creating workflow maps of business processes JPH06225059A (en) 1993-01-25 1994-08-12 Hitachi Ltd FAX system and e-mail system US5369707A (en) 1993-01-27 1994-11-29 Tecsec Incorporated Secure network method and apparatus US5351293A (en) 1993-02-01 1994-09-27 Wave Systems Corp. System method and apparatus for authenticating an encrypted signal WO1994018620A1 (en) 1993-02-08 1994-08-18 Action Technologies, Inc. Method and apparatus for managing business processes US5842185A (en) * 1993-02-18 1998-11-24 Intuit Inc. Method and system for electronically tracking financial transactions US5640546A (en) 1993-02-23 1997-06-17 Network Programs, Inc. Composition of systems of objects by interlocking coordination, projection, and distribution CA2102883A1 (en) 1993-02-26 1994-08-27 James W. Arendt System and method for lazy loading of shared libraries US5365587A (en) 1993-03-11 1994-11-15 International Business Machines Corporation Self modifying access code for altering capabilities US5315448A (en) 1993-03-18 1994-05-24 Macrovision Corporation Copy protection for hybrid digital video tape recording and unprotected source material US5469576A (en) * 1993-03-22 1995-11-21 International Business Machines Corporation Front end for file access controller FR2703800B1 (en) 1993-04-06 1995-05-24 Bull Cp8 Method for signing a computer file, and device for implementing it. US5408501A (en) 1993-04-06 1995-04-18 Conner Peripherals, Inc. Data transfer system JP3255754B2 (en) 1993-04-23 2002-02-12 å¯å£«éæ ªå¼ä¼ç¤¾ Electronic trading system US5422953A (en) 1993-05-05 1995-06-06 Fischer; Addison M. Personal date/time notary device US5504837A (en) 1993-05-10 1996-04-02 Bell Communications Research, Inc. Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a goal hierarchy with acceptable, unacceptable, and indeterminate nodes US5583936A (en) 1993-05-17 1996-12-10 Macrovision Corporation Video copy protection process enhancement to introduce horizontal and vertical picture distortions US5649099A (en) 1993-06-04 1997-07-15 Xerox Corporation Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security US5337357A (en) 1993-06-17 1994-08-09 Software Security, Inc. Method of software distribution protection US5428606A (en) 1993-06-30 1995-06-27 Moskowitz; Scott A. Digital information commodities exchange US5550971A (en) 1993-06-30 1996-08-27 U S West Technologies, Inc. Method and system for generating a user interface adaptable to various database management systems JPH07200317A (en) 1993-12-28 1995-08-04 Toshiba Corp Operation right management equipment US5418713A (en) 1993-08-05 1995-05-23 Allen; Richard Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a remote location of previously recorded or programmed materials AU683038B2 (en) 1993-08-10 1997-10-30 Addison M. Fischer A method for operating computers and for processing information among computers JPH0756794A (en) 1993-08-13 1995-03-03 Fujitsu Ltd Document management device US5458494A (en) 1993-08-23 1995-10-17 Edutech Research Labs, Ltd. Remotely operable teaching system and method therefor JPH0784852A (en) 1993-09-10 1995-03-31 Hitachi Ltd Information security method IL110891A (en) 1993-09-14 1999-03-12 Spyrus System and method for data access control US5841868A (en) * 1993-09-21 1998-11-24 Helbig, Sr.; Walter Allen Trusted computer system CA2129075C (en) 1993-10-18 1999-04-20 Joseph J. Daniele Electronic copyright royalty accounting system using glyphs US5369702A (en) 1993-10-18 1994-11-29 Tecsec Incorporated Distributed cryptographic object method US5432851A (en) 1993-10-21 1995-07-11 Tecsec Incorporated Personal computer access control system US6135646A (en) 1993-10-22 2000-10-24 Corporation For National Research Initiatives System for uniquely and persistently identifying, managing, and tracking digital objects US5343527A (en) 1993-10-27 1994-08-30 International Business Machines Corporation Hybrid encryption method and system for protecting reusable software components JPH07212712A (en) 1993-10-29 1995-08-11 Eastman Kodak Co Method and equipment for adding and deleting digital watermark in hierarchical picture memory and fetch system US5463565A (en) 1993-10-29 1995-10-31 Time Warner Entertainment Co., L.P. Data block format for software carrier and player therefor US5455953A (en) 1993-11-03 1995-10-03 Wang Laboratories, Inc. Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket JPH07141138A (en) 1993-11-12 1995-06-02 Nec Software Kansai Ltd Menu using right managing system US5537526A (en) 1993-11-12 1996-07-16 Taugent, Inc. Method and apparatus for processing a display document utilizing a system level document framework US5625690A (en) 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system US5636292C1 (en) 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data US5841978A (en) * 1993-11-18 1998-11-24 Digimarc Corporation Network linking method using steganographically embedded data objects US6681029B1 (en) * 1993-11-18 2004-01-20 Digimarc Corporation Decoding steganographic messages embedded in media signals US5748783A (en) 1995-05-08 1998-05-05 Digimarc Corporation Method and apparatus for robust information coding US5832119C1 (en) 1993-11-18 2002-03-05 Digimarc Corp Methods for controlling systems using control signals embedded in empirical data US5768426A (en) 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals EP0737387B1 (en) 1993-11-18 2003-04-09 Digimarc Corporation Identification/authentication coding method and apparatus US6122403A (en) * 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects US5572673A (en) 1993-12-01 1996-11-05 Sybase, Inc. Secure multi-level system for executing stored procedures US6086706A (en) 1993-12-20 2000-07-11 Lucent Technologies Inc. Document copying deterrent method US5453605A (en) 1993-12-22 1995-09-26 Xerox Corporation Global addressability for self-clocking glyph codes US5449895A (en) 1993-12-22 1995-09-12 Xerox Corporation Explicit synchronization for self-clocking glyph codes US5449896A (en) 1993-12-22 1995-09-12 Xerox Corporation Random access techniques for use with self-clocking glyph codes US5513261A (en) 1993-12-29 1996-04-30 At&T Corp. Key management scheme for use with electronic cards US5450493A (en) 1993-12-29 1995-09-12 At&T Corp. Secure communication method and apparatus JPH07200492A (en) 1993-12-29 1995-08-04 Csk Corp Management system for right of using software on network US5473687A (en) 1993-12-29 1995-12-05 Infosafe Systems, Inc. Method for retrieving secure information from a database US5457747A (en) 1994-01-14 1995-10-10 Drexler Technology Corporation Anti-fraud verification system using a data card US5420927B1 (en) 1994-02-01 1997-02-04 Silvio Micali Method for certifying public keys in a digital signature scheme US5553143A (en) * 1994-02-04 1996-09-03 Novell, Inc. Method and apparatus for electronic licensing US5422645A (en) 1994-02-14 1995-06-06 The United States Of America As Represented By The Secretary Of The Army Delayed laser retroreflector pulse technique and system US5530752A (en) 1994-02-22 1996-06-25 Convex Computer Corporation Systems and methods for protecting software from unlicensed copying and use JP2853727B2 (en) 1994-02-22 1999-02-03 æ¥æ¬ãã¯ã¿ã¼æ ªå¼ä¼ç¤¾ Reproduction protection method and protection reproduction device GB9403362D0 (en) * 1994-02-22 1994-04-13 Summit Medical Ltd Bone cement mixing apparatus WO1995023411A1 (en) 1994-02-28 1995-08-31 Sony Corporation Method and device for recording data, data recording medium, and method and device for reproducing data JPH07244639A (en) 1994-03-03 1995-09-19 Fujitsu Ltd Access right management device JPH09510567A (en) 1994-03-21 1997-10-21 ãªãã¸ã§ã¯ã ãã¯ããã¸ã¼ ã©ã¤ã»ã³ã·ã³ã° ã³ã¼ãã¬ã¤ã·ã§ã³ Document proxy framework US5450490A (en) 1994-03-31 1995-09-12 The Arbitron Company Apparatus and methods for including codes in audio signals and decoding DE4413451A1 (en) 1994-04-18 1995-12-14 Rolf Brugger Device for the distribution of music information in digital form US5505461A (en) 1994-04-19 1996-04-09 Caesars World, Inc. Method for meeting IRS reporting requirements related to an electronic gaming machine US5563946A (en) 1994-04-25 1996-10-08 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems JP3753749B2 (en) 1994-04-28 2006-03-08 å¤§æ¥æ¬å°å·æ ªå¼ä¼ç¤¾ System for providing copyrighted material using a network US5644686A (en) 1994-04-29 1997-07-01 International Business Machines Corporation Expert system and method employing hierarchical knowledge base, and interactive multimedia/hypermedia applications JPH07319681A (en) 1994-05-23 1995-12-08 Nec Corp Programming system by example US5539828A (en) 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications US5473692A (en) 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent US5649117A (en) * 1994-06-03 1997-07-15 Midwest Payment Systems System and method for paying bills and other obligations including selective payor and payee controls US5533123A (en) 1994-06-28 1996-07-02 National Semiconductor Corporation Programmable distributed personal security US5739864A (en) 1994-08-24 1998-04-14 Macrovision Corporation Apparatus for inserting blanked formatted fingerprint data (source ID, time/date) in to a video signal US5513260A (en) 1994-06-29 1996-04-30 Macrovision Corporation Method and apparatus for copy protection for various recording media US5999711A (en) 1994-07-18 1999-12-07 Microsoft Corporation Method and system for providing certificates holding authentication and authorization information for users/machines CA2128587A1 (en) 1994-07-21 1996-01-22 Ed Morson Method and arrangement for recognition of a coded transmitted signal US5574787A (en) 1994-07-25 1996-11-12 Ryan; John O. Apparatus and method for comprehensive copy protection for video platforms and unprotected source material US5590194A (en) 1994-08-09 1996-12-31 Macrovision Corporation Method of and apparatus for scrambling a video signal with full network transmission and recording capability US5701463A (en) * 1994-09-09 1997-12-23 Cheyenne Advanced Technology Limited Method of replacing the identity of a file with another as part of a file open request in a computer system EP0706275B1 (en) 1994-09-15 2006-01-25 International Business Machines Corporation System and method for secure storage and distribution of data using digital signatures WO1996009585A1 (en) 1994-09-21 1996-03-28 Wang Laboratories, Inc. A link manager for managing links integrating data between application programs US5504757A (en) 1994-09-27 1996-04-02 International Business Machines Corporation Method for selecting transmission speeds for transmitting data packets over a serial bus US5678170A (en) 1994-10-05 1997-10-14 Motorola, Inc. Method and apparatus for monitoring and limiting distribution of data JP3496774B2 (en) 1994-10-11 2004-02-16 æ¾ä¸é»å¨ç£æ¥æ ªå¼ä¼ç¤¾ Mail order system US5842173A (en) 1994-10-14 1998-11-24 Strum; David P. Computer-based surgical services management system ZA958446B (en) 1994-10-19 1996-05-27 Intergame A method and system for cashless gaming machine operation JPH08152990A (en) 1994-11-28 1996-06-11 Canon Inc Operation right information display system JP3853387B2 (en) 1994-11-15 2006-12-06 å¯å£«éæ ªå¼ä¼ç¤¾ Data access right management method in data independent computer system US5638443A (en) 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works US5634012A (en) 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism US5629980A (en) 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work KR100332743B1 (en) 1994-11-26 2002-11-07 ìì§ì ì주ìíì¬ Device and method for preventing illegal copy or unauthorized watching of digital image US5758257A (en) 1994-11-29 1998-05-26 Herz; Frederick System and method for scheduling broadcast of and access to video programs and other data using customer profiles US5553282A (en) 1994-12-09 1996-09-03 Taligent, Inc. Software project history database and method of operation US5802590A (en) 1994-12-13 1998-09-01 Microsoft Corporation Method and system for providing secure access to computer resources EP0717337B1 (en) 1994-12-13 2001-08-01 International Business Machines Corporation Method and system for the secured distribution of programs US5655077A (en) 1994-12-13 1997-08-05 Microsoft Corporation Method and system for authenticating access to heterogeneous computing services US5646997A (en) 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data JPH08185292A (en) 1994-12-27 1996-07-16 Nec Corp Bidirectional printer interface US5745569A (en) 1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code JP3524187B2 (en) 1994-12-28 2004-05-10 ãã¤ãã³æ ªå¼ä¼ç¤¾ Shared window operation right management system and control method therefor US6944555B2 (en) * 1994-12-30 2005-09-13 Power Measurement Ltd. Communications architecture for intelligent electronic devices US5732400A (en) 1995-01-04 1998-03-24 Citibank N.A. System and method for a risk-based purchase of goods US5748738A (en) * 1995-01-17 1998-05-05 Document Authentication Systems, Inc. System and method for electronic transmission, storage and retrieval of authenticated documents US5692180A (en) 1995-01-31 1997-11-25 International Business Machines Corporation Object-oriented cell directory database for a distributed computing environment SE504085C2 (en) 1995-02-01 1996-11-04 Greg Benson Methods and systems for managing data objects in accordance with predetermined conditions for users US5643428A (en) 1995-02-01 1997-07-01 Advanced Micro Devices, Inc. Multiple tier collimator system for enhanced step coverage and uniformity JPH08214281A (en) 1995-02-06 1996-08-20 Sony Corp Charging method and system JPH11500275A (en) 1995-02-10 1999-01-06 ãã¬ãã¯ã·ã¼ãã¤ã¢ã«ã»ãããã©ã¤ã¢ã¿ãªã»ãªãããã Interactive broadcasting system US7095854B1 (en) 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels US6948070B1 (en) 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection US7124302B2 (en) 1995-02-13 2006-10-17 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management US7165174B1 (en) 1995-02-13 2007-01-16 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management US5530235A (en) 1995-02-16 1996-06-25 Xerox Corporation Interactive contents revealing storage device US5774872A (en) 1995-03-31 1998-06-30 Richard Golden Automated taxable transaction reporting/collection system US5534975A (en) 1995-05-26 1996-07-09 Xerox Corporation Document processing system utilizing document service cards to provide document processing services US5740549A (en) 1995-06-12 1998-04-14 Pointcast, Inc. Information and advertising distribution system and method US5699427A (en) 1995-06-23 1997-12-16 International Business Machines Corporation Method to deter document and intellectual property piracy through individualization US5689565A (en) 1995-06-29 1997-11-18 Microsoft Corporation Cryptography system and method for providing cryptographic services for a computer application US5625693A (en) 1995-07-07 1997-04-29 Thomson Consumer Electronics, Inc. Apparatus and method for authenticating transmitting applications in an interactive TV system US5802497A (en) 1995-07-10 1998-09-01 Digital Equipment Corporation Method and apparatus for conducting computerized commerce JPH0944993A (en) 1995-07-31 1997-02-14 Pioneer Electron Corp Information recording method and device therefor, function recording method and device therefor and information reproducing method and device therefor JP4518574B2 (en) 1995-08-11 2010-08-04 ã½ãã¼æ ªå¼ä¼ç¤¾ Recording method and apparatus, recording medium, and reproducing method and apparatus US5913040A (en) 1995-08-22 1999-06-15 Backweb Ltd. Method and apparatus for transmitting and displaying information between a remote network and a local computer KR0166923B1 (en) 1995-09-18 1999-03-20 구ìí Method and apparatus of preventing an illegal watching and copying in a digital broadcasting system WO1997014249A1 (en) 1995-10-09 1997-04-17 Matsushita Electric Industrial Co., Ltd. Data transmitter, data transmitting method, data receiver, information processor, and information recording medium US6807534B1 (en) 1995-10-13 2004-10-19 Trustees Of Dartmouth College System and method for managing copyrighted electronic media US5765152A (en) 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media US5689566A (en) 1995-10-24 1997-11-18 Nguyen; Minhtam C. Network with secure communications sessions US5757914A (en) 1995-10-26 1998-05-26 Sun Microsystems, Inc. System and method for protecting use of dynamically linked executable modules US5671279A (en) 1995-11-13 1997-09-23 Netscape Communications Corporation Electronic commerce using a secure courier system US5949881A (en) * 1995-12-04 1999-09-07 Intel Corporation Apparatus and method for cryptographic companion imprinting JPH09160899A (en) 1995-12-06 1997-06-20 Matsushita Electric Ind Co Ltd Information service processor US5692047A (en) 1995-12-08 1997-11-25 Sun Microsystems, Inc. System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources US5794210A (en) 1995-12-11 1998-08-11 Cybergold, Inc. Attention brokerage US5633932A (en) 1995-12-19 1997-05-27 Intel Corporation Apparatus and method for preventing disclosure through user-authentication at a printing node JP2000503193A (en) 1996-01-03 2000-03-14 ã½ãã¼ ã¨ã¬ã¯ãããã¯ã¹ ã¤ã³ã¯ Copy protection recording and playback device JPH09208823A (en) 1996-01-29 1997-08-12 Toyota Central Res & Dev Lab Inc Polyimide composite powder and method for producing the same US5754849A (en) 1996-01-30 1998-05-19 Wayfarer Communications, Inc. Self-describing object providing dynamic manipulation of heterogeneous data values and semantic identity between memory and transmission representations US5689587A (en) 1996-02-09 1997-11-18 Massachusetts Institute Of Technology Method and apparatus for data hiding in images US5862325A (en) 1996-02-29 1999-01-19 Intermind Corporation Computer-based communication system and method using metadata defining a control structure US5896454A (en) 1996-03-08 1999-04-20 Time Warner Entertainment Co., L.P. System and method for controlling copying and playing of digital programs JP3816571B2 (en) 1996-03-15 2006-08-30 ãã¤ãªãã¢æ ªå¼ä¼ç¤¾ Information recording apparatus, information recording method, information reproducing apparatus, and information reproducing method US5991876A (en) 1996-04-01 1999-11-23 Copyright Clearance Center, Inc. Electronic rights management and authorization system US6085238A (en) 1996-04-23 2000-07-04 Matsushita Electric Works, Ltd. Virtual LAN system US5978484A (en) 1996-04-25 1999-11-02 Microsoft Corporation System and method for safety distributing executable objects AU3205797A (en) 1996-05-15 1997-12-05 Intertrust Technologies Corp. Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances US5892899A (en) 1996-06-13 1999-04-06 Intel Corporation Tamper resistant methods and apparatus US5819263A (en) 1996-07-19 1998-10-06 American Express Financial Corporation Financial planning system incorporating relationship and group management EP1577816A3 (en) 1996-09-04 2006-08-02 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce and rights management US6102965A (en) 1996-09-23 2000-08-15 National Instruments Corporation System and method for providing client/server access to graphical programs US5692980A (en) 1996-10-24 1997-12-02 Trotman; Stephenson E. Kick bag game and apparatus kit US7062500B1 (en) 1997-02-25 2006-06-13 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures US5920861A (en) 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures US5999949A (en) 1997-03-14 1999-12-07 Crandall; Gary E. Text file compression system utilizing word terminators US6108420A (en) 1997-04-10 2000-08-22 Channelware Inc. Method and system for networked installation of uniquely customized, authenticable, and traceable software application EP0988591A1 (en) 1997-06-09 2000-03-29 Intertrust, Incorporated Obfuscation techniques for enhancing software security DE19726027C2 (en) 1997-06-19 1999-05-06 Memminger Iro Gmbh Thread delivery device and coupling device US6330549B1 (en) 1997-10-30 2001-12-11 Xerox Corporation Protected shareware US6112181A (en) 1997-11-06 2000-08-29 Intertrust Technologies Corporation Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information US7809138B2 (en) 1999-03-16 2010-10-05 Intertrust Technologies Corporation Methods and apparatus for persistent control and protection of content EP1062812B1 (en) 1998-03-16 2005-05-25 Intertrust Technologies Corp. Streaming media player with continuous control and protection of media content US6477559B1 (en) 1998-08-21 2002-11-05 Aspect Communications Corporation Method and apparatus for remotely accessing an automatic transaction processing system US6393484B1 (en) 1999-04-12 2002-05-21 International Business Machines Corp. System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks US6785815B1 (en) 1999-06-08 2004-08-31 Intertrust Technologies Corp. Methods and systems for encoding and protecting data using digital signature and watermarking techniques US6959384B1 (en) 1999-12-14 2005-10-25 Intertrust Technologies Corporation Systems and methods for authenticating and protecting the integrity of data streams and other data WO2001006374A2 (en) 1999-07-16 2001-01-25 Intertrust Technologies Corp. System and method for securing an untrusted storage WO2001010076A2 (en) 1999-07-29 2001-02-08 Intertrust Technologies Corp. Systems and methods for protecting secure and insecure computing environments using cryptography US6950867B1 (en) 1999-07-30 2005-09-27 Intertrust Technologies Corp. System and method for managing transaction record delivery using an acknowledgement-monitoring process and a failure-recovery process with modifying the predefined fault condition US6832316B1 (en) 1999-12-22 2004-12-14 Intertrust Technologies, Corp. Systems and methods for protecting data secrecy and integrity JP3481543B2 (en) * 2000-03-15 2003-12-22 æ ªå¼ä¼ç¤¾ãã¼ããã¯ã¹ã¹ã¿ã³ãã¼ã Microphone device US6973499B1 (en) 2000-04-07 2005-12-06 Intertrust Technologies Corp. Ticketing and keying for orchestrating distribution of network content US7085839B1 (en) 2000-04-07 2006-08-01 Intertrust Technologies Corporation Network content management US7313692B2 (en) 2000-05-19 2007-12-25 Intertrust Technologies Corp. Trust management systems and methods US7050586B1 (en) 2000-06-19 2006-05-23 Intertrust Technologies Corporation Systems and methods for retrofitting electronic appliances to accept different content formats US7580988B2 (en) 2001-04-05 2009-08-25 Intertrust Technologies Corporation System and methods for managing the distribution of electronic content US7136840B2 (en) 2001-04-20 2006-11-14 Intertrust Technologies Corp. Systems and methods for conducting transactions and communications using a trusted third party US7149899B2 (en) 2002-04-25 2006-12-12 Intertrust Technologies Corp. Establishing a secure channel with a human userFree format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4